Detecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash.
| Data Component | Name | Channel |
|---|---|---|
| Application Log Content (DC0038) | Application Log | None |