CWE-1261 |
Improper Handling of Single Event Upsets |
|
|
CWE-1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
|
|
CWE-126 |
Buffer Over-read |
|
|
CWE-1259 |
Improper Restriction of Security Token Assignment |
|
|
CWE-1258 |
Exposure of Sensitive System Information Due to Uncleared Debug Information |
|
|
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
|
|
CWE-1256 |
Hardware Features Enable Physical Attacks from Software |
|
|
CWE-1255 |
Comparison Logic is Vulnerable to Power Side-Channel Attacks |
|
|
CWE-1254 |
Incorrect Comparison Logic Granularity |
|
|
CWE-1253 |
Incorrect Selection of Fuse Values |
|
|
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
|
|
CWE-1251 |
Mirrored Regions with Different Values |
|
|
CWE-1250 |
Improper Preservation of Consistency Between Independent Representations of Shared State |
|
|
CWE-125 |
Out-of-bounds Read |
|
|
CWE-1249 |
Application-Level Admin Tool with Inconsistent View of Underlying Operating System |
|
|
CWE-1248 |
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications |
|
|
CWE-1247 |
Missing or Improperly Implemented Protection Against Voltage and Clock Glitches |
|
|
CWE-1246 |
Improper Write Handling in Limited-write Non-Volatile Memories |
|
|
CWE-1245 |
Improper Finite State Machines (FSMs) in Hardware Logic |
|
|
CWE-1244 |
Improper Access to Sensitive Information Using Debug and Test Interfaces |
|
|