Posted by malvuln on Apr 28

Discovery / credits: Malvuln – (c) 2021
Original source:
Contact: malvuln13 () gmail com

Threat: Backdoor.Win32.Agent.afq
Vulnerability: Directory Traversal
Description: The malwares built-in server “UberWWW v. 1.1” listens on TCP
port 8080. The server allows third-party attackers to read arbitrary files
outside of its root…
Read More – Full Disclosure

By |2021-04-29T00:19:04-04:00April 29th, 2021|