The software uses a resource that has not been properly initialized. When reusing a resource such as memory or a program variable, the original contents of that resource may not be cleared before it is sent to an untrusted party. The uninitialized resource may contain values that cause program flow to change in ways that the programmer did not intend. The weakness is introduced during Implementation stage.