CWE-1285 – Improper Validation of Specified Index, Position, or Offset in Input
Description The product receives input that is expected to specify an index, position, or offset into an indexable resource such as a buffer or file,...
CWE-1286 – Improper Validation of Syntactic Correctness of Input
Description The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate...
CWE-1250 – Improper Preservation of Consistency Between Independent Representations of Shared State
Description The product has or supports multiple distributed components or sub-systems that are each required to keep their own local copy of shared data -...
CWE-1251 – Mirrored Regions with Different Values
Description The product's architecture mirrors regions without ensuring that their contents always stay in sync. Modes of Introduction: Related Weaknesses CWE-1250 Consequences...
CWE-1252 – CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
Description The CPU is not configured to provide hardware support for exclusivity of write and execute operations on memory. This allows an attacker to execute...
CWE-1253 – Incorrect Selection of Fuse Values
Description The logic level used to set a system to a secure state relies on a fuse being unblown. An attacker can set the system...
CWE-1254 – Incorrect Comparison Logic Granularity
Description The product's comparison logic is performed over a series of steps rather than across the entire string in one operation. If there is a...
CWE-1255 – Comparison Logic is Vulnerable to Power Side-Channel Attacks
Description A device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value...
CWE-1256 – Improper Restriction of Software Interfaces to Hardware Features
Description The product provides software-controllable device functionality for capabilities such as power and clock management, but it does not properly limit functionality that can lead...
CWE-1257 – Improper Access Control Applied to Mirrored or Aliased Memory Regions
Description Aliased or mirrored memory regions in hardware designs may have inconsistent read/write permissions enforced by the hardware. A possible result is that an untrusted...