CWE-459 - Incomplete cleanup


The software does not properly "clean up" and remove temporary or supporting resources after they have been used. An attacker can leverage such resources to gain access to sensitive information or use them in further actions to compromise the application.

Latest vulnerabilities for CWE-459


Description of CWE-459 on Mitre website