Xastir Insecure Temporary File Creation Vulnerabilities

An attacker uses readily available commands to exploit these issues.


 

Privacy Statement
Copyright 2010, SecurityFocus