Read Time:13 Second
Description
The product manages resources or behaves in a way that indirectly creates a new, distinct resource that can be used by attackers in violation of the intended policy.
Modes of Introduction:
Related Weaknesses
Consequences