CWE-1250 |
Improper Preservation of Consistency Between Independent Representations of Shared State |
|
|
CWE-125 |
Out-of-bounds Read |
|
|
CWE-1249 |
Application-Level Admin Tool with Inconsistent View of Underlying Operating System |
|
|
CWE-1248 |
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications |
|
|
CWE-1247 |
Improper Protection Against Voltage and Clock Glitches |
|
|
CWE-1246 |
Improper Write Handling in Limited-write Non-Volatile Memories |
|
|
CWE-1245 |
Improper Finite State Machines (FSMs) in Hardware Logic |
|
|
CWE-1244 |
Internal Asset Exposed to Unsafe Debug Access Level or State |
|
|
CWE-1243 |
Sensitive Non-Volatile Information Not Protected During Debug |
|
|
CWE-1242 |
Inclusion of Undocumented Features or Chicken Bits |
|
|
CWE-1241 |
Use of Predictable Algorithm in Random Number Generator |
|
|
CWE-1240 |
Use of a Cryptographic Primitive with a Risky Implementation |
|
|
CWE-124 |
Buffer Underwrite ('Buffer Underflow') |
|
|
CWE-1239 |
Improper Zeroization of Hardware Register |
|
|
CWE-1238 |
SFP Primary Cluster: Failure to Release Memory |
|
|
CWE-1237 |
SFP Primary Cluster: Faulty Resource Release |
|
|
CWE-1236 |
Improper Neutralization of Formula Elements in a CSV File |
|
|
CWE-1235 |
Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations |
|
|
CWE-1234 |
Hardware Internal or Debug Modes Allow Override of Locks |
|
|
CWE-1233 |
Security-Sensitive Hardware Controls with Missing Lock Bit Protection |
|
|