| Improperly Implemented Security Check for Standard | |
| Improper Handling of Overlap Between Protected Memory Ranges | |
| Sequence of Processor Instructions Leads to Unexpected Behavior | |
| Out-of-bounds Write | |
| Insufficient Granularity of Access Control | |
| Insufficient Compartmentalization | |
| Out-of-Bounds | |
| Insufficient Resource Pool | |
| Uncaught Exception | |
| CVE-2025-24495 | |
| CVE-2025-20623 | |
| Incorrect Behavior Order | |
| CVE-2024-43420 | |
| CVE-2024-28956 | |
| CVE-2024-45332 | |
| CVE-2024-39355 | |
| Sequence of Processor Instructions Leads to Unexpected Behavior | |
| Improper Access Control | |
| Improper Finite State Machines (FSMs) in Hardware Logic | |
| Improper Finite State Machines (FSMs) in Hardware Logic | |
| Information Exposure | |
| CVE-2024-23918 | |
| Improper Finite State Machines (FSMs) in Hardware Logic | |
| Incorrect Default Permissions | |
| Information Exposure | |
| Improper Finite State Machines (FSMs) in Hardware Logic | |
| CVE-2024-24853 | |
| CVE-2024-24980 | |
| CVE-2024-25939 | |
| CVE-2023-49141 | |
| CVE-2023-42667 | |
| CVE-2023-47855 | |
| CVE-2023-46103 | |
| CVE-2023-45733 | |
| CVE-2023-45745 | |
| CVE-2023-43490 | |
| CVE-2023-38575 | |
| CVE-2023-39368 | |
| CVE-2023-22655 | |
| CVE-2023-28746 | |
| Sequence of Processor Instructions Leads to Unexpected Behavior | |
| Sequence of Processor Instructions Leads to Unexpected Behavior | |
| CVE-2023-23908 | |
| Information Exposure | |
| CVE-2022-41804 | |
| Incorrect Calculation | |