Exposure of Core Dump File to an Unauthorized Control Sphere
CWE-528
Short description
The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.
Best practices to prevent this CWE
Phase: System Configuration
Protect the core dump files from unauthorized access.