All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-1258: Exposure of Sensitive System Information Due to Uncleared Debug Information
Learn about CWE-1258 (Exposure of Sensitive System Information Due to Uncleared Debug Information), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1259: Improper Restriction of Security Token Assignment
Learn about CWE-1259 (Improper Restriction of Security Token Assignment), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-126: Buffer Over-read
Learn about CWE-126 (Buffer Over-read), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1260: Improper Handling of Overlap Between Protected Memory Ranges
Learn about CWE-1260 (Improper Handling of Overlap Between Protected Memory Ranges), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1261: Improper Handling of Single Event Upsets
Learn about CWE-1261 (Improper Handling of Single Event Upsets), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1262: Improper Access Control for Register Interface
Learn about CWE-1262 (Improper Access Control for Register Interface), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1263: Improper Physical Access Control
Learn about CWE-1263 (Improper Physical Access Control), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1264: Hardware Logic with Insecure De-Synchronization between Control and Data Channels
Learn about CWE-1264 (Hardware Logic with Insecure De-Synchronization between Control and Data Channels), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1265: Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls
Learn about CWE-1265 (Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1266: Improper Scrubbing of Sensitive Data from Decommissioned Device
Learn about CWE-1266 (Improper Scrubbing of Sensitive Data from Decommissioned Device), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1267: Policy Uses Obsolete Encoding
Learn about CWE-1267 (Policy Uses Obsolete Encoding), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified