Posted by malvuln on Feb 26

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/1dd6eb39a388f4c8a3eaf248d86aaabc.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Trojan-Proxy.Win32.Delf.ai
Vulnerability: Remote SEH Buffer Overflow
Description: The malware listens on TCP port 1089. Attackers who can reach
the infected system can send a specially crafted HTTP TRACE request to
trigger a classic SEH buffer…
Read More – Full Disclosure


By |2021-02-26T09:20:02+00:00February 26th, 2021|