Posted by malvuln on Feb 26

Discovery / credits: Malvuln – (c) 2021
Original source:
Contact: malvuln13 () gmail com

Vulnerability: Remote SEH Buffer Overflow
Description: The malware listens on TCP port 1089. Attackers who can reach
the infected system can send a specially crafted HTTP TRACE request to
trigger a classic SEH buffer…
Read More – Full Disclosure

By |2021-02-26T09:20:02-05:00February 26th, 2021|