Re: Survey: Use of Same Attack/Same Codebase content decision in VDB's
I think those kinds of things are outside the scope of the CVE.
"Proctor, Paul" wrote:
> One of the disconnects between the host-based ID and the CVE is that
> vulnerability exploitation is only one aspect of monitoring. We also
> monitor for behavior deviations, trends, and patterns of misuse such as
> abuse of privilege. I've been wondering if the CVE will attempt to address
> these or just stick with known vulnerabilities.
org:The MITRE Corporation
adr:;;1820 Dolley Madison Blvd;McLean;VA;22102;