All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-1247: Improper Protection Against Voltage and Clock Glitches
Learn about CWE-1247 (Improper Protection Against Voltage and Clock Glitches), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1248: Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
Learn about CWE-1248 (Semiconductor Defects in Hardware Logic with Security-Sensitive Implications), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1249: Application-Level Admin Tool with Inconsistent View of Underlying Operating System
Learn about CWE-1249 (Application-Level Admin Tool with Inconsistent View of Underlying Operating System), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-125: Out-of-bounds Read
Learn about CWE-125 (Out-of-bounds Read), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1250: Improper Preservation of Consistency Between Independent Representations of Shared State
Learn about CWE-1250 (Improper Preservation of Consistency Between Independent Representations of Shared State), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1251: Mirrored Regions with Different Values
Learn about CWE-1251 (Mirrored Regions with Different Values), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1252: CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
Learn about CWE-1252 (CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1253: Incorrect Selection of Fuse Values
Learn about CWE-1253 (Incorrect Selection of Fuse Values), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1254: Incorrect Comparison Logic Granularity
Learn about CWE-1254 (Incorrect Comparison Logic Granularity), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1255: Comparison Logic is Vulnerable to Power Side-Channel Attacks
Learn about CWE-1255 (Comparison Logic is Vulnerable to Power Side-Channel Attacks), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1256: Improper Restriction of Software Interfaces to Hardware Features
Learn about CWE-1256 (Improper Restriction of Software Interfaces to Hardware Features), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified