BROWSER-IE -- Snort has detected traffic known to exploit vulnerabilities present in the Internet Explorer browser, or products that have the Trident or Tasman engines.
BROWSER-IE Microsoft Windows Scripting Engine use-after-free attempt
This rule looks for indicators that are found in use-after-free exploits which target this vulnerability.
This rule alerts when a malicious webpage is detected which attempts to trigger a use-after-free vulnerability in Internet Explorer.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None
Tactic: Initial Access
Technique: Drive-by Compromise
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org