F028. Insecure temporary files

Description

The system uses temporary files to store sensitive information. Alternatively, the system deploys sensitive temporary files to the production environment.

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.