CWE

Common Weakness Enumeration

A community-developed list of SW & HW weaknesses that can become vulnerabilities

New to CWE? click here!
CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
Home > CWE List > Reports > Schema Differences between Version 6.5 and Version 6.6  
ID

Schema Differences between Version 6.5 and Version 6.6

Version 6.5 Schema File: cwe_schema_v6.5.xsd -> Version 6.6 Schema File: cwe_schema_v6.6.xsd

Minor changes from 6.5 --> 6.6:

Added "Formal Verification" and "Simulation / Emulation" to the DetectionMethodEnumeration, which is used in the Detection_Method element in weaknesses.

Added "Discouraged Common Practice" to the EffectivenessEnumeration, which is used in the Mitigation element in weaknesses. "Discouraged Common Practice" is used to indicate mitigations that are commonly attempted but known to be ineffective or highly risky.

Page Last Updated: October 27, 2021