When an application manipulates files, "Time-Of-Check to Time-Of-Use" can occur when a file-checking operation is disconnected from the actual operation it is bound to. For example, such a vulnerability occurs when a file existence check is performed strictly before a file creation operation.