Answer:
Attackers can exploit a Time-of-Check to Time-of-Use (TOCTOU) issue by manipulating the time interval between the check and the use of a resource to bypass security controls.
Attackers can exploit a Time-of-Check to Time-of-Use (TOCTOU) issue by manipulating the time interval between the check and the use of a resource to bypass security controls.
You may be interested in:
Web Security MCQs - PART 2