[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Survey: Use of Same Attack/Same Codebase content decision in VDB's



I think those kinds of things are outside the scope of the CVE.

Bill

"Proctor, Paul" wrote:

> <SNIP>
> One of the disconnects between the host-based ID and the CVE is that
> vulnerability exploitation is only one aspect of monitoring.  We also
> monitor for behavior deviations, trends, and patterns of misuse such as
> abuse of privilege.  I've been wondering if the CVE will attempt to address
> these or just stick with known vulnerabilities.
>
> <SNIP>
begin:vcard 
n:Hill;William
tel;work:703-883-6416
x-mozilla-html:TRUE
org:The MITRE Corporation
adr:;;1820 Dolley Madison Blvd;McLean;VA;22102;
version:2.1
email;internet:bill@mitre.org
title:INFOSEC Engineer
fn:Bill Hill
end:vcard

Page Last Updated or Reviewed: May 22, 2007