
116 Vulnerability ManageMent
they are too numerous to review and include for the many thousands
of products in use around the world.
4.9 e Standard for Vulnerability Test Data
Typically, the vulnerability information used by a particular vendor of
a VM scanner or analyzer is stored in a database that is designed to
work seamlessly with the software. Since standards are usually a few
to several years behind industry, none of these databases are alike. e
vulnerability data and method of identification vary widely from one
product to another—that is, there is no standard.
However, MITRE has driven the idea of a standard for just
this type of ...