Posted by malvuln on Jan 03

Discovery / credits: malvuln – Malvuln.com (c) 2021
Original source:
http://malvuln.com/advisory/0418e7f95a8b94c035e10749234f8378.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Email-Worm.Win32.Zhelatin.ago
Vulnerability: Remote Stack Buffer Overflow
Description: Buffer overflow on server response TCP Port 80, upon
receiving 532 bytes or more we can overwrite insruction pointer (EIP)
to control program execution flow….
Read More – Full Disclosure


By |2021-01-04T00:42:50-05:00January 4th, 2021|