CWE-1258 |
Exposure of Sensitive System Information Due to Uncleared Debug Information |
|
|
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
|
|
CWE-1256 |
Improper Restriction of Software Interfaces to Hardware Features |
|
|
CWE-1255 |
Comparison Logic is Vulnerable to Power Side-Channel Attacks |
|
|
CWE-1254 |
Incorrect Comparison Logic Granularity |
|
|
CWE-1253 |
Incorrect Selection of Fuse Values |
|
|
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
|
|
CWE-1251 |
Mirrored Regions with Different Values |
|
|
CWE-1250 |
Improper Preservation of Consistency Between Independent Representations of Shared State |
|
|
CWE-125 |
Out-of-bounds Read |
|
|
CWE-1249 |
Application-Level Admin Tool with Inconsistent View of Underlying Operating System |
|
|
CWE-1248 |
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications |
|
|
CWE-1247 |
Improper Protection Against Voltage and Clock Glitches |
|
|
CWE-1246 |
Improper Write Handling in Limited-write Non-Volatile Memories |
|
|
CWE-1245 |
Improper Finite State Machines (FSMs) in Hardware Logic |
|
|
CWE-1244 |
Internal Asset Exposed to Unsafe Debug Access Level or State |
|
|
CWE-1243 |
Sensitive Non-Volatile Information Not Protected During Debug |
|
|
CWE-1242 |
Inclusion of Undocumented Features or Chicken Bits |
|
|
CWE-1241 |
Use of Predictable Algorithm in Random Number Generator |
|
|
CWE-1240 |
Use of a Cryptographic Primitive with a Risky Implementation |
|
|