6 lines
329 B
Plaintext
6 lines
329 B
Plaintext
The impact of a successfully exploited race condition is dependent on the
|
|
business logic of the vulnerable application. The consequences will vary
|
|
depending on what check is performed and how the file is used.
|
|
|
|
In general, attackers use such attacks to escalate privileges, execute arbitrary
|
|
code, or perform a denial of service. |