FILE-EXECUTABLE -- Snort detected traffic targeting vulnerabilites that are found in or delivered through executable files, regardless of platform. In those instances, Snort is able to correct traffic that has been altered.
FILE-EXECUTABLE Microsoft Windows kernel use-after-free attempt
This event is generated when a binary that exploits a use-after-free vulnerability in the Windows kernel is detected. Impact: Privilege escalation Details: Ease of Attack:
No information provided
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
CVE-2018-8611 |
Loading description
|