CAPEC-639: Probe System Files
An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information.
Severity
Medium
11
/ 100
low-risk
Active Threat
10/50 · Low
Exploit Availability
1/50 · Minimal