| Submission Date | Submitter | Organization |
|---|---|---|
| 2014-06-23 | CAPEC Content Team | The MITRE Corporation |
Submission Date: 2014-06-23
Submitter: CAPEC Content Team
Organization: The MITRE Corporation
| Modification Date | Modifier | Organization | Comment |
|---|---|---|---|
| 2017-01-09 | CAPEC Content Team | The MITRE Corporation | Updated Examples-Instances, Related_Attack_Patterns |
| 2020-07-30 | CAPEC Content Team | The MITRE Corporation | Updated Execution_Flow |
| 2021-06-24 | CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses |
| 2021-10-21 | CAPEC Content Team | The MITRE Corporation | Updated Execution_Flow |
| 2022-09-29 | CAPEC Content Team | The MITRE Corporation | Updated Example_Instances |
Modification Date: 2017-01-09
Modifier: CAPEC Content Team
Organization: The MITRE Corporation
Comment:
Modification Date: 2020-07-30
Modifier: CAPEC Content Team
Organization: The MITRE Corporation
Comment:
Modification Date: 2021-06-24
Modifier: CAPEC Content Team
Organization: The MITRE Corporation
Comment:
Modification Date: 2021-10-21
Modifier: CAPEC Content Team
Organization: The MITRE Corporation
Comment:
Modification Date: 2022-09-29
Modifier: CAPEC Content Team
Organization: The MITRE Corporation
Comment:
| Change Date | Previous Entry Name |
|---|---|
| 2017-01-09 | Manipulating Input to File System Calls |
Change Date: 2017-01-09
Previous Entry Name: Manipulating Input to File System Calls