Posted by malvuln on Apr 28

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/853754de6b8ffbe1321a8c91aab5c232_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.afq
Vulnerability: Directory Traversal
Description: The malwares built-in server “UberWWW v. 1.1” listens on TCP
port 8080. The server allows third-party attackers to read arbitrary files
outside of its root…
Read More – Full Disclosure


By |2021-04-29T00:19:04-04:00April 29th, 2021|