mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
61 lines
2.8 KiB
Markdown
61 lines
2.8 KiB
Markdown
![]() |
### [CVE-2019-6447](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6447)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html
|
||
|
- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xStrygwyr/OSCP-Guide
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/0xZipp0/OSCP
|
||
|
- https://github.com/0xsyr0/OSCP
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Chethine/EsFileExplorer-CVE-2019-6447
|
||
|
- https://github.com/H0j3n/EzpzCheatSheet
|
||
|
- https://github.com/H3xL00m/CVE-2019-6447
|
||
|
- https://github.com/KasunPriyashan/CVE-2019_6447-ES-File-Explorer-Exploitation
|
||
|
- https://github.com/KaviDk/CVE-2019-6447-in-Mobile-Application
|
||
|
- https://github.com/Kayky-cmd/CVE-2019-6447--.
|
||
|
- https://github.com/Ly0nt4r/OSCP
|
||
|
- https://github.com/N3H4L/CVE-2019-6447
|
||
|
- https://github.com/Nehal-Zaman/CVE-2019-6447
|
||
|
- https://github.com/Osuni-99/CVE-2019-6447
|
||
|
- https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447
|
||
|
- https://github.com/SirElmard/ethical_hacking
|
||
|
- https://github.com/VinuKalana/CVE-2019-6447-Android-Vulnerability-in-ES-File-Explorer
|
||
|
- https://github.com/amjadkhan345/esfile
|
||
|
- https://github.com/angristan/awesome-stars
|
||
|
- https://github.com/c0d3cr4f73r/CVE-2019-6447
|
||
|
- https://github.com/codeonlinux/esexplorervuln
|
||
|
- https://github.com/crypticdante/CVE-2019-6447
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/e-hakson/OSCP
|
||
|
- https://github.com/eljosep/OSCP-Guide
|
||
|
- https://github.com/febinrev/CVE-2019-6447-ESfile-explorer-exploit
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/julio-cfa/POC-ES-File-Explorer-CVE-2019-6447
|
||
|
- https://github.com/k4u5h41/CVE-2019-6447
|
||
|
- https://github.com/kgwanjala/oscp-cheatsheet
|
||
|
- https://github.com/mooyoul/awesome-stars
|
||
|
- https://github.com/n3ov4n1sh/CVE-2019-6447
|
||
|
- https://github.com/nitishbadole/oscp-note-3
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/oscpname/OSCP_cheat
|
||
|
- https://github.com/revanmalang/OSCP
|
||
|
- https://github.com/svg153/awesome-stars
|
||
|
- https://github.com/txuswashere/OSCP
|
||
|
- https://github.com/vino-theva/CVE-2019-6447
|
||
|
- https://github.com/volysandro/cve_2019-6447
|
||
|
- https://github.com/x00tex/hackTheBox
|
||
|
- https://github.com/xhref/OSCP
|
||
|
|