Question 559:
After discovering the /etc/shadow file had been rewritten, a security administrator noticed an application insecurely creating files in / tmp. Which of the following vulnerabilities has MOST likely been exploited?
Answer options:
A. Privilege escalation B. Resource exhaustion C. Memory leak D. Pointer dereference