Read Time:13 Second

Description

The product manages resources or behaves in a way that indirectly creates a new, distinct resource that can be used by attackers in violation of the intended policy.

Modes of Introduction:

 

 

Related Weaknesses

CWE-664

 

Consequences

 

Potential Mitigations

CVE References