7 lines
295 B
Plaintext
7 lines
295 B
Plaintext
When an application manipulates files, "Time-Of-Check to Time-Of-Use" can occur
|
|
when a file-checking operation is disconnected from the actual operation it is
|
|
bound to.
|
|
|
|
For example, such a vulnerability occurs when a file existence check is
|
|
performed strictly before a file creation operation.
|