CAPEC Related Weakness
Collect Data from Common Resource Locations
CWE-552 Files or Directories Accessible to External Parties
CWE-1239 Improper Zeroization of Hardware Register
CWE-1258 Exposure of Sensitive System Information Due to Uncleared Debug Information
CWE-1266 Improper Scrubbing of Sensitive Data from Decommissioned Device
CWE-1272 Sensitive Information Uncleared Before Debug/Power State Transition
CWE-1323 Improper Management of Sensitive Trace Data
CWE-1324 Sensitive Information Accessible by Physical Probing of JTAG Interface
CWE-1330 Remanent Data Readable after Memory Erase
Retrieve Embedded Sensitive Data
CWE-226 Sensitive Information in Resource Not Removed Before Reuse
CWE-311 Missing Encryption of Sensitive Data
CWE-312 Cleartext Storage of Sensitive Information
CWE-314 Cleartext Storage in the Registry
CWE-315 Cleartext Storage of Sensitive Information in a Cookie
CWE-318 Cleartext Storage of Sensitive Information in Executable
CWE-525 Use of Web Browser Cache Containing Sensitive Information
CWE-1239 Improper Zeroization of Hardware Register
CWE-1258 Exposure of Sensitive System Information Due to Uncleared Debug Information
CWE-1266 Improper Scrubbing of Sensitive Data from Decommissioned Device
CWE-1272 Sensitive Information Uncleared Before Debug/Power State Transition
CWE-1278 Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
CWE-1301 Insufficient or Incomplete Data Removal within Hardware Component
CWE-1330 Remanent Data Readable after Memory Erase
Pull Data from System Resources
CWE-1239 Improper Zeroization of Hardware Register
CWE-1243 Sensitive Non-Volatile Information Not Protected During Debug
CWE-1258 Exposure of Sensitive System Information Due to Uncleared Debug Information
CWE-1258 Exposure of Sensitive System Information Due to Uncleared Debug Information
CWE-1266 Improper Scrubbing of Sensitive Data from Decommissioned Device
CWE-1272 Sensitive Information Uncleared Before Debug/Power State Transition
CWE-1278 Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
CWE-1323 Improper Management of Sensitive Trace Data
CWE-1324 Sensitive Information Accessible by Physical Probing of JTAG Interface
CWE-1330 Remanent Data Readable after Memory Erase
Incomplete Data Deletion in a Multi-Tenant Environment
CWE-284 Improper Access Control
CWE-1266 Improper Scrubbing of Sensitive Data from Decommissioned Device
CWE-1272 Sensitive Information Uncleared Before Debug/Power State Transition