Course: Insecure Temporary Files (CWE-377)

Course: Insecure Temporary Files (CWE-377)

Cover

In this course, we will look at CWE-377, which discusses the weaknesses caused by the usage of insecure temporary files.

This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. The course describes the security impact of the vulnerability. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.

At the end of this course, you will be able to:

  • Describe the insecure temporary file vulnerability.
  • Explain the security impact of using temporary files in an insecure manner.
  • Describe the technical aspects of using insecure temporary files, with examples.
  • Describe the remediation strategies to mitigate the problems described by CWE-377.
Vendor:
Klocwork
Premiered:
Nov 13, 2013
Format:
Multimedia
Type:
Webcast
Language:
English
Already a Bitpipe member? Login here

Download this Webcast!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy