CWE-1345 |
OWASP Top Ten 2021 Category A01:2021 - Broken Access Control |
|
|
CWE-1342 |
Information Exposure through Microarchitectural State after Transient Execution |
|
|
CWE-1341 |
Multiple Releases of Same Resource or Handle |
|
|
CWE-134 |
Use of Externally-Controlled Format String |
|
|
CWE-1339 |
Insufficient Precision or Accuracy of a Real Number |
|
|
CWE-1338 |
Improper Protections Against Hardware Overheating |
|
|
CWE-1336 |
Improper Neutralization of Special Elements Used in a Template Engine |
|
|
CWE-1335 |
Incorrect Bitwise Shift of Integer |
|
|
CWE-1334 |
Unauthorized Error Injection Can Degrade Hardware Redundancy |
|
|
CWE-1333 |
Inefficient Regular Expression Complexity |
|
|
CWE-1332 |
Improper Handling of Faults that Lead to Instruction Skips |
|
|
CWE-1331 |
Improper Isolation of Shared Resources in Network On Chip (NoC) |
|
|
CWE-1330 |
Remanent Data Readable after Memory Erase |
|
|
CWE-133 |
String Errors |
|
|
CWE-1329 |
Reliance on Component That is Not Updateable |
|
|
CWE-1328 |
Security Version Number Mutable to Older Versions |
|
|
CWE-1327 |
Binding to an Unrestricted IP Address |
|
|
CWE-1326 |
Missing Immutable Root of Trust in Hardware |
|
|
CWE-1325 |
Improperly Controlled Sequential Memory Allocation |
|
|
CWE-1324 |
DEPRECATED: Sensitive Information Accessible by Physical Probing of JTAG Interface |
|
|