CWE-1294 |
Insecure Security Identifier Mechanism |
|
|
CWE-1293 |
Missing Source Correlation of Multiple Independent Data |
|
|
CWE-1292 |
Incorrect Conversion of Security Identifiers |
|
|
CWE-1291 |
Public Key Re-Use for Signing both Debug and Production Code |
|
|
CWE-1290 |
Incorrect Decoding of Security Identifiers |
|
|
CWE-129 |
Improper Validation of Array Index |
|
|
CWE-1289 |
Improper Validation of Unsafe Equivalence in Input |
|
|
CWE-1288 |
Improper Validation of Consistency within Input |
|
|
CWE-1287 |
Improper Validation of Specified Type of Input |
|
|
CWE-1286 |
Improper Validation of Syntactic Correctness of Input |
|
|
CWE-1285 |
Improper Validation of Specified Index, Position, or Offset in Input |
|
|
CWE-1284 |
Improper Validation of Specified Quantity in Input |
|
|
CWE-1283 |
Mutable Attestation or Measurement Reporting Data |
|
|
CWE-1282 |
Assumed-Immutable Data is Stored in Writable Memory |
|
|
CWE-1281 |
Sequence of Processor Instructions Leads to Unexpected Behavior |
|
|
CWE-1280 |
Access Control Check Implemented After Asset is Accessed |
|
|
CWE-128 |
Wrap-around Error |
|
|
CWE-1279 |
Cryptographic Operations are run Before Supporting Units are Ready |
|
|
CWE-1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
|
|
CWE-1277 |
Firmware Not Updateable |
|
|