Insecure creation of temporary files allows local users on systems with non-default configurations to cause denial of service or set the encryption key for a filesystem
Creating and using insecure temporary files can leave application and system data vulnerable to attack.