Exploitation of Thunderbolt Protection Flaws |
CWE-288
|
Authentication Bypass Using an Alternate Path or Channel
|
CWE-345
|
Insufficient Verification of Data Authenticity
|
CWE-353
|
Missing Support for Integrity Check
|
CWE-862
|
Missing Authorization
|
CWE-1188
|
Insecure Default Initialization of Resource
|
|