CWE-1270 |
Generation of Incorrect Security Tokens |
|
|
CWE-127 |
Buffer Under-read |
|
|
CWE-1269 |
Product Released in Non-Release Configuration |
|
|
CWE-1268 |
Policy Privileges are not Assigned Consistently Between Control and Data Agents |
|
|
CWE-1267 |
Policy Uses Obsolete Encoding |
|
|
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
|
|
CWE-1265 |
Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls |
|
|
CWE-1264 |
Hardware Logic with Insecure De-Synchronization between Control and Data Channels |
|
|
CWE-1263 |
Improper Physical Access Control |
|
|
CWE-1262 |
Register Interface Allows Software Access to Sensitive Data or Security Settings |
|
|
CWE-1261 |
Improper Handling of Single Event Upsets |
|
|
CWE-1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
|
|
CWE-126 |
Buffer Over-read |
|
|
CWE-1259 |
Improper Restriction of Security Token Assignment |
|
|
CWE-1258 |
Exposure of Sensitive System Information Due to Uncleared Debug Information |
|
|
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
|
|
CWE-1256 |
Hardware Features Enable Physical Attacks from Software |
|
|
CWE-1255 |
Comparison Logic is Vulnerable to Power Side-Channel Attacks |
|
|
CWE-1254 |
Incorrect Comparison Logic Granularity |
|
|
CWE-1253 |
Incorrect Selection of Fuse Values |
|
|