All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-1316: Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges
Learn about CWE-1316 (Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1317: Improper Access Control in Fabric Bridge
Learn about CWE-1317 (Improper Access Control in Fabric Bridge), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1318: Missing Support for Security Features in On-chip Fabrics or Buses
Learn about CWE-1318 (Missing Support for Security Features in On-chip Fabrics or Buses), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1319: Improper Protection against Electromagnetic Fault Injection (EM-FI)
Learn about CWE-1319 (Improper Protection against Electromagnetic Fault Injection (EM-FI)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-132: DEPRECATED: Miscalculated Null Termination
Learn about CWE-132 (DEPRECATED: Miscalculated Null Termination), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1320: Improper Protection for Outbound Error Messages and Alert Signals
Learn about CWE-1320 (Improper Protection for Outbound Error Messages and Alert Signals), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Learn about CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1322: Use of Blocking Code in Single-threaded, Non-blocking Context
Learn about CWE-1322 (Use of Blocking Code in Single-threaded, Non-blocking Context), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1323: Improper Management of Sensitive Trace Data
Learn about CWE-1323 (Improper Management of Sensitive Trace Data), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1324: DEPRECATED: Sensitive Information Accessible by Physical Probing of JTAG Interface
Learn about CWE-1324 (DEPRECATED: Sensitive Information Accessible by Physical Probing of JTAG Interface), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1325: Improperly Controlled Sequential Memory Allocation
Learn about CWE-1325 (Improperly Controlled Sequential Memory Allocation), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified