lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <pczHgIR3pG03iyA8d3fQHDNpVR25rkaBPVCtNXzlZdYD7gblHcyjV5Lyw80C05uT5rajz0BjKaV4YqAphh8ogC_F97SOe1SzsR8_i7X0ZHg=@protonmail.ch> Date: Wed, 13 Jan 2021 07:36:52 +0000 From: "network.mp4 via Fulldisclosure" <fulldisclosure@...lists.org> To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org> Subject: Re: [FD] Backdoor.Win32.Xtreme.yvp / Insecure Permissions EoP bo0od <bo0od@...eup.net> at Fri, 8 Jan 2021 10:31:06 +0000: > When you say backdoor, you mean backdoor which microsoft remotely using > it or you mean a malware can take advantage of? No, the backdoor is referring to a specific Windows malware program that has a vulnerability that can be abused as a backdoor. There is no proof that this malware was made by Microsoft and the email does not suggest that. Regards! _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists