Course: Insecure Temporary Files (CWE-377)

Course: Insecure Temporary Files (CWE-377)


In this course, we will look at CWE-377, which discusses the weaknesses caused by the usage of insecure temporary files.

This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. The course describes the security impact of the vulnerability. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.

At the end of this course, you will be able to:

  • Describe the insecure temporary file vulnerability.
  • Explain the security impact of using temporary files in an insecure manner.
  • Describe the technical aspects of using insecure temporary files, with examples.
  • Describe the remediation strategies to mitigate the problems described by CWE-377.
Nov 13, 2013
Already a Bitpipe member? Login here

Download this Webcast!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor