Make sure to set appropriate permissions ... With this option an attacker with ability to fill up the filesystem (flood server with web requests, or if they have an account just fill the disk up) can ...
Some results have been hidden because they may be inaccessible to you