[
Date Prev][
Date Next][
Thread Prev][
Thread Next][
Date Index][
Thread Index]
Re: Survey: Use of Same Attack/Same Codebase content decision in VDB's
I think those kinds of things are outside the scope of the CVE.
Bill
"Proctor, Paul" wrote:
> <SNIP>
> One of the disconnects between the host-based ID and the CVE is that
> vulnerability exploitation is only one aspect of monitoring. We also
> monitor for behavior deviations, trends, and patterns of misuse such as
> abuse of privilege. I've been wondering if the CVE will attempt to address
> these or just stick with known vulnerabilities.
>
> <SNIP>
begin:vcard
n:Hill;William
tel;work:703-883-6416
x-mozilla-html:TRUE
org:The MITRE Corporation
adr:;;1820 Dolley Madison Blvd;McLean;VA;22102;
version:2.1
email;internet:bill@mitre.org
title:INFOSEC Engineer
fn:Bill Hill
end:vcard