Differences between 2.5 and 2.6 Content
Summary of Entry Types
Type |
2.5 |
2.6 |
Views |
8 |
8 |
Categories |
60 |
58 |
Attack Patterns |
450 |
454 |
Deprecated |
18 |
24 |
Attack Pattern Changes
Attack Pattern Changes
Existing Patterns
Modified with Enhanced Material
|
Patterns
Deprecated
|
CAPEC-157 |
Sniffing Attacks |
CAPEC-254 |
DTD Injection in a SOAP Message |
CAPEC-258 |
Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Dynamic Update |
CAPEC-259 |
Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Patching |
CAPEC-260 |
Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Initial Distribution |
CAPEC-269 |
DEPRECATED: Registry Manipulation |
Category Changes
Category Changes
New Categories
Added
|
CAPEC-286 |
Reconnaissance |
Existing Categories
Modified with Enhanced Material
|
View Changes
View Changes
Existing Views
Modified with Enhanced Material
|
Mapping Changes
Mapping Changes
CAPEC --> CWE
Mappings Added
|
CAPEC-158 Sniffing Network Traffic |
--> |
CWE-311 |
Missing Encryption of Sensitive Data |
CAPEC --> CWE
Mappings Removed
|
CAPEC-228 Resource Depletion through DTD Injection in a SOAP Message |
--> |
CWE-400 |
Uncontrolled Resource Consumption ('Resource Exhaustion') |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC --> CAPEC
Mappings Added
|
CAPEC --> CAPEC
Mappings Removed
|
More information is available — Please select a different filter.
|