FILE-EXECUTABLE -- Snort detected traffic targeting vulnerabilites that are found in or delivered through executable files, regardless of platform. In those instances, Snort is able to correct traffic that has been altered.
FILE-EXECUTABLE Microsoft Windows kernel user after free attempt
This event is generated when an attempt to trigger a user after free in the windows kernel is detected. Impact: Attempted Administrator Privilege Gain Details: Ease of Attack:
No information provided
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
CVE-2019-0685 |
Loading description
|