Posted by malvuln on Jan 22

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/56a2b135c8d35561ea5b04694155eb77.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.WinShell.30
Vulnerability: Remote Stack Buffer Overflow / Missing Authentication
Description: WinShell.30 listens on TCP port 5277 for commands.
Attackers or responders who can reach the infected host can trigger a
buffer overflow…
Read More – Full Disclosure


By |2021-01-22T19:22:45-05:00January 22nd, 2021|