Transmission of Private Resources into a New Sphere ('Resource Leak') |
Weakness ID: 402 (Weakness Class) | Status: Draft |
Description Summary
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 399 | Resource Management Errors | Development Concepts (primary)699 |
ChildOf | ![]() | 668 | Exposure of Resource to Wrong Sphere | Research Concepts (primary)1000 |
ParentOf | ![]() | 403 | UNIX File Descriptor Leak | Development Concepts (primary)699 Research Concepts (primary)1000 |
ParentOf | ![]() | 619 | Dangling Database Cursor ('Cursor Injection') | Development Concepts699 Research Concepts1000 |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Taxonomy Mappings | ||||
2009-05-27 | CWE Content Team | MITRE | Internal | |
updated Name | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-04-11 | Resource Leaks | |||
2009-05-27 | Transmission of Private Resources into a New Sphere (aka 'Resource Leak') | |||
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.
28 June 2016