Differences between 2.2 and 2.3 Content
Summary of Entry Types
Type |
2.2 |
2.3 |
Views |
7 |
7 |
Categories |
51 |
51 |
Attack Patterns |
401 |
421 |
Deprecated |
17 |
17 |
Attack Pattern Changes
Attack Pattern Changes
Existing Patterns
Modified with Enhanced Material
|
Category Changes
Category Changes
Existing Categories
Modified with Enhanced Material
|
View Changes
View Changes
Existing Views
Modified with Enhanced Material
|
Mapping Changes
Mapping Changes
CAPEC --> CWE
Mappings Added
|
CAPEC-473 Signature Spoofing |
--> |
CWE-20 |
Improper Input Validation |
--> |
CWE-290 |
Authentication Bypass by Spoofing |
--> |
CWE-327 |
Use of a Broken or Risky Cryptographic Algorithm |
CAPEC-474 Signature Spoofing by Key Theft |
--> |
CWE-216 |
Containment Errors (Container Errors) |
--> |
CWE-284 |
Improper Access Control |
--> |
CWE-693 |
Protection Mechanism Failure |
CAPEC-475 Signature Spoofing by Improper Validation |
--> |
CWE-693 |
Protection Mechanism Failure |
CAPEC-477 Signature Spoofing by Mixing Signed and Unsigned Content |
--> |
CWE-311 |
Missing Encryption of Sensitive Data |
--> |
CWE-319 |
Cleartext Transmission of Sensitive Information |
--> |
CWE-693 |
Protection Mechanism Failure |
CAPEC-485 Signature Spoofing by Key Recreation |
--> |
CWE-310 |
Cryptographic Issues |
--> |
CWE-330 |
Use of Insufficiently Random Values |
CAPEC --> CWE
Mappings Removed
|
CAPEC --> CAPEC
Mappings Added
|
CAPEC --> CAPEC
Mappings Removed
|
More information is available — Please select a different filter.
|