All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-1258: Exposure of Sensitive System Information Due to Uncleared Debug Information
Learn about CWE-1258 (Exposure of Sensitive System Information Due to Uncleared Debug Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1259: Improper Restriction of Security Token Assignment
Learn about CWE-1259 (Improper Restriction of Security Token Assignment), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-126: Buffer Over-read
Learn about CWE-126 (Buffer Over-read), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1260: Improper Handling of Overlap Between Protected Memory Ranges
Learn about CWE-1260 (Improper Handling of Overlap Between Protected Memory Ranges), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1261: Improper Handling of Single Event Upsets
Learn about CWE-1261 (Improper Handling of Single Event Upsets), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1262: Improper Access Control for Register Interface
Learn about CWE-1262 (Improper Access Control for Register Interface), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1263: Improper Physical Access Control
Learn about CWE-1263 (Improper Physical Access Control), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1264: Hardware Logic with Insecure De-Synchronization between Control and Data Channels
Learn about CWE-1264 (Hardware Logic with Insecure De-Synchronization between Control and Data Channels), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1265: Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls
Learn about CWE-1265 (Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1266: Improper Scrubbing of Sensitive Data from Decommissioned Device
Learn about CWE-1266 (Improper Scrubbing of Sensitive Data from Decommissioned Device), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1267: Policy Uses Obsolete Encoding
Learn about CWE-1267 (Policy Uses Obsolete Encoding), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1268: Policy Privileges are not Assigned Consistently Between Control and Data Agents
Learn about CWE-1268 (Policy Privileges are not Assigned Consistently Between Control and Data Agents), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified