| Insufficient Resource Pool | |
| Uncaught Exception | |
| Hardware Features Enable Physical Attacks from Software | |
| Improper Access Control | |
| Improper Finite State Machines (FSMs) in Hardware Logic | |
| Improper Finite State Machines (FSMs) in Hardware Logic | |
| Insufficient Granularity of Access Control | |
| Improper Input Validation | |
| Improper Initialization | |
| Improper Finite State Machines (FSMs) in Hardware Logic | |
| Resource Exhaustion | |
| Information Exposure | |
| Improper Input Validation | |
| Protection Mechanism Failure | |
| Incorrect Calculation | |
| Protection Mechanism Failure | |
| CVE-2023-28746 | |
| Non-Transparent Sharing of Microarchitectural Resources | |
| Unauthorized Error Injection Can Degrade Hardware Redundancy | |
| CVE-2022-38090 | |
| Incorrect Calculation | |
| Incorrect Default Permissions | |
| CVE-2022-21216 | |
| Out-of-bounds Read | |
| CVE-2021-0127 | |
| Improper Initialization | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Incomplete Cleanup | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Sensitive Information Uncleared Before Release | |
| Insufficient Granularity of Access Control | |
| Improper Cross-boundary Removal of Sensitive Data | |