CWE-1298 |
Hardware Logic Contains Race Conditions |
|
|
CWE-1297 |
Unprotected Confidential Information on Device is Accessible by OSAT Vendors |
|
|
CWE-1296 |
Incorrect Chaining or Granularity of Debug Components |
|
|
CWE-1295 |
Debug Messages Revealing Unnecessary Information |
|
|
CWE-1294 |
Insecure Security Identifier Mechanism |
|
|
CWE-1293 |
Missing Source Correlation of Multiple Independent Data |
|
|
CWE-1292 |
Incorrect Conversion of Security Identifiers |
|
|
CWE-1291 |
Public Key Re-Use for Signing both Debug and Production Code |
|
|
CWE-1290 |
Incorrect Decoding of Security Identifiers |
|
|
CWE-129 |
Improper Validation of Array Index |
|
|
CWE-1289 |
Improper Validation of Unsafe Equivalence in Input |
|
|
CWE-1288 |
Improper Validation of Consistency within Input |
|
|
CWE-1287 |
Improper Validation of Specified Type of Input |
|
|
CWE-1286 |
Improper Validation of Syntactic Correctness of Input |
|
|
CWE-1285 |
Improper Validation of Specified Index, Position, or Offset in Input |
|
|
CWE-1284 |
Improper Validation of Specified Quantity in Input |
|
|
CWE-1283 |
Mutable Attestation or Measurement Reporting Data |
|
|
CWE-1282 |
Assumed-Immutable Data is Stored in Writable Memory |
|
|
CWE-1281 |
Sequence of Processor Instructions Leads to Unexpected Behavior |
|
|
CWE-1280 |
Access Control Check Implemented After Asset is Accessed |
|
|