Differences between 2.5 and 2.6 Content
Summary of Entry Types
| Type |
2.5 |
2.6 |
| Views |
8 |
8 |
| Categories |
60 |
58 |
| Attack Patterns |
450 |
454 |
| Deprecated |
18 |
24 |
Attack Pattern Changes
Attack Pattern Changes
| Existing Patterns
Modified with Enhanced Material
|
| Patterns
Deprecated
|
| CAPEC-157 |
Sniffing Attacks |
| CAPEC-254 |
DTD Injection in a SOAP Message |
| CAPEC-258 |
Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Dynamic Update |
| CAPEC-259 |
Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Patching |
| CAPEC-260 |
Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Initial Distribution |
| CAPEC-269 |
DEPRECATED: Registry Manipulation |
Category Changes
Category Changes
| New Categories
Added
|
| CAPEC-286 |
Reconnaissance |
| Existing Categories
Modified with Enhanced Material
|
View Changes
View Changes
| Existing Views
Modified with Enhanced Material
|
Mapping Changes
Mapping Changes
| CAPEC --> CWE
Mappings Added
|
| CAPEC-158 Sniffing Network Traffic |
| --> |
CWE-311 |
Missing Encryption of Sensitive Data |
| CAPEC --> CWE
Mappings Removed
|
| CAPEC-228 Resource Depletion through DTD Injection in a SOAP Message |
| --> |
CWE-400 |
Uncontrolled Resource Consumption ('Resource Exhaustion') |
| --> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
| CAPEC --> CAPEC
Mappings Added
|
| CAPEC --> CAPEC
Mappings Removed
|
More information is available — Please select a different filter.
|