Exploitation of Thunderbolt Protection Flaws |
CWE-288
|
Authentication Bypass Using an Alternate Path or Channel
|
CWE-345
|
Insufficient Verification of Data Authenticity
|
CWE-353
|
Missing Support for Integrity Check
|
CWE-862
|
Missing Authorization
|
CWE-1188
|
Initialization of a Resource with an Insecure Default
|
|