Posted by malvuln on Jan 03

Discovery / credits: malvuln – Malvuln.com (c) 2021
Original source:
http://malvuln.com/advisory/9919c1e86a750dd6d4f0d2a851af29ea.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: BACKDOOR.WIN32.ADVERBOT
Vulnerability: Remote Stack Corruption
Description: Null instruction pointer read stack corruption when
connecting to an IRC server Port 6667.
The NetControl.File component allows connecting to server to IRC
servers to file…
Read More – Full Disclosure


By |2021-01-03T23:27:09+00:00January 3rd, 2021|