All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-1247: Improper Protection Against Voltage and Clock Glitches
Learn about CWE-1247 (Improper Protection Against Voltage and Clock Glitches), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1248: Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
Learn about CWE-1248 (Semiconductor Defects in Hardware Logic with Security-Sensitive Implications), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1249: Application-Level Admin Tool with Inconsistent View of Underlying Operating System
Learn about CWE-1249 (Application-Level Admin Tool with Inconsistent View of Underlying Operating System), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-125: Out-of-bounds Read
Learn about CWE-125 (Out-of-bounds Read), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1250: Improper Preservation of Consistency Between Independent Representations of Shared State
Learn about CWE-1250 (Improper Preservation of Consistency Between Independent Representations of Shared State), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1251: Mirrored Regions with Different Values
Learn about CWE-1251 (Mirrored Regions with Different Values), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1252: CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
Learn about CWE-1252 (CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1253: Incorrect Selection of Fuse Values
Learn about CWE-1253 (Incorrect Selection of Fuse Values), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1254: Incorrect Comparison Logic Granularity
Learn about CWE-1254 (Incorrect Comparison Logic Granularity), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1255: Comparison Logic is Vulnerable to Power Side-Channel Attacks
Learn about CWE-1255 (Comparison Logic is Vulnerable to Power Side-Channel Attacks), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1256: Improper Restriction of Software Interfaces to Hardware Features
Learn about CWE-1256 (Improper Restriction of Software Interfaces to Hardware Features), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1257: Improper Access Control Applied to Mirrored or Aliased Memory Regions
Learn about CWE-1257 (Improper Access Control Applied to Mirrored or Aliased Memory Regions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified