Transmission of Private Resources into a New Sphere ('Resource Leak')
Weakness ID: 402 (Weakness Class)Status: Draft
+ Description

Description Summary

The software makes resources available to untrusted parties when those resources are only intended to be accessed by the software.
+ Time of Introduction
  • Architecture and Design
  • Implementation
+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
ChildOfCategoryCategory399Resource Management Errors
Development Concepts (primary)699
ChildOfWeakness ClassWeakness Class668Exposure of Resource to Wrong Sphere
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base403UNIX File Descriptor Leak
Development Concepts (primary)699
Research Concepts (primary)1000
ParentOfWeakness BaseWeakness Base619Dangling Database Cursor ('Cursor Injection')
Development Concepts699
Research Concepts1000
+ Taxonomy Mappings
Mapped Taxonomy NameNode IDFitMapped Node Name
PLOVERResource leaks
+ Content History
Submissions
Submission DateSubmitterOrganizationSource
PLOVERExternally Mined
Modifications
Modification DateModifierOrganizationSource
2008-07-01Eric DalciCigitalExternal
updated Time of Introduction
2008-09-08CWE Content TeamMITREInternal
updated Relationships, Taxonomy Mappings
2009-05-27CWE Content TeamMITREInternal
updated Name
Previous Entry Names
Change DatePrevious Entry Name
2008-04-11Resource Leaks
2009-05-27Transmission of Private Resources into a New Sphere (aka 'Resource Leak')