CWE Name | CWE-ID | Vulnerabilities |
|---|---|---|
| Improper Protection against Electromagnetic Fault Injection (EM-FI) | 1319 | 6 |
| Improper Protection for Outbound Error Messages and Alert Signals | 1320 | 7 |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | 1321 | 456 |
| Use of Blocking Code in Single-threaded, Non-blocking Context | 1322 | 0 |
| Improper Management of Sensitive Trace Data | 1323 | 2 |
| Improperly Controlled Sequential Memory Allocation | 1325 | 18 |
| Missing Immutable Root of Trust in Hardware | 1326 | 9 |
| Binding to an Unrestricted IP Address | 1327 | 12 |
| Security Version Number Mutable to Older Versions | 1328 | 5 |
| Reliance on Component That is Not Updateable | 1329 | 3 |
| Remanent Data Readable after Memory Erase | 1330 | 0 |
| Improper Isolation of Shared Resources in Network On Chip (NoC) | 1331 | 0 |
| Improper Handling of Faults that Lead to Instruction Skips | 1332 | 3 |
| Inefficient Regular Expression Complexity | 1333 | 397 |
| Unauthorized Error Injection Can Degrade Hardware Redundancy | 1334 | 1 |
| Incorrect Bitwise Shift of Integer | 1335 | 5 |
| Improper Neutralization of Special Elements Used in a Template Engine | 1336 | 129 |
| Improper Protections Against Hardware Overheating | 1338 | 0 |
| Insufficient Precision or Accuracy of a Real Number | 1339 | 0 |
| Multiple Releases of Same Resource or Handle | 1341 | 2 |
| Information Exposure through Microarchitectural State after Transient Execution | 1342 | 1 |
| Improper Handling of Hardware Behavior in Exceptionally Cold Environments | 1351 | 0 |
| Reliance on Insufficiently Trustworthy Component | 1357 | 0 |
| Improper Handling of Physical or Environmental Conditions | 1384 | 0 |
| Missing Origin Validation in WebSockets | 1385 | 0 |
| Insecure Operation on Windows Junction / Mount Point | 1386 | 0 |
| Incorrect Parsing of Numbers with Different Radices | 1389 | 0 |
| Weak Authentication | 1390 | 0 |
| Use of Weak Credentials | 1391 | 0 |
| Use of Default Credentials | 1392 | 0 |
| Use of Default Password | 1393 | 0 |
| Use of Default Cryptographic Key | 1394 | 0 |
| Dependency on Vulnerable Third-Party Component | 1395 | 0 |