CAPEC-639: Probe System Files

An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information.

Severity
Medium
11
/ 100
low-risk
Active Threat 10/50 · Low
Exploit Availability 1/50 · Minimal