Differences between 2.3 and 2.4 Content
Summary of Entry Types
Type |
2.3 |
2.4 |
Views |
7 |
8 |
Categories |
51 |
60 |
Attack Patterns |
421 |
449 |
Deprecated |
17 |
17 |
Attack Pattern Changes
Attack Pattern Changes
Existing Patterns
Modified with Enhanced Material
|
CAPEC-224 |
Fingerprinting |
Category Changes
Category Changes
View Changes
View Changes
Existing Views
Modified with Enhanced Material
|
Mapping Changes
Mapping Changes
CAPEC --> CWE
Mappings Added
|
CAPEC-224 Fingerprinting |
--> |
CWE-208 |
Information Exposure Through Timing Discrepancy |
CAPEC-462 Cross-Domain Search Timing |
--> |
CWE-208 |
Information Exposure Through Timing Discrepancy |
CAPEC-510 SaaS User Request Forgery |
--> |
CWE-346 |
Origin Validation Error |
CAPEC --> CWE
Mappings Removed
|
CAPEC-118 Data Leakage Attacks |
--> |
CWE-404 |
Improper Resource Shutdown or Release |
CAPEC-227 Denial of Service through Resource Depletion |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-281 Analytic Attacks |
--> |
CWE-200 |
Information Exposure |
--> |
CWE-330 |
Use of Insufficiently Random Values |
--> |
CWE-514 |
Covert Channel |
CAPEC --> CAPEC
Mappings Added
|
CAPEC --> CAPEC
Mappings Removed
|
More information is available — Please select a different filter.
|