The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.When a resource is not released after use, it can allow attackers to cause a denial of service.