mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-28 01:04:30 +00:00
3.1 KiB
3.1 KiB
CVE-2019-6447
Description
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
POC
Reference
- http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html
- http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html
- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
Github
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xT11/CVE-POC
- https://github.com/0xZipp0/OSCP
- https://github.com/0xsyr0/OSCP
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Chethine/EsFileExplorer-CVE-2019-6447
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/H3xL00m/CVE-2019-6447
- https://github.com/KasunPriyashan/CVE-2019_6447-ES-File-Explorer-Exploitation
- https://github.com/KaviDk/CVE-2019-6447-in-Mobile-Application
- https://github.com/Kayky-cmd/CVE-2019-6447--.
- https://github.com/Ly0nt4r/OSCP
- https://github.com/N3H4L/CVE-2019-6447
- https://github.com/Nehal-Zaman/CVE-2019-6447
- https://github.com/Osuni-99/CVE-2019-6447
- https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447
- https://github.com/SirElmard/ethical_hacking
- https://github.com/VinuKalana/CVE-2019-6447-Android-Vulnerability-in-ES-File-Explorer
- https://github.com/amjadkhan345/esfile
- https://github.com/angristan/awesome-stars
- https://github.com/c0d3cr4f73r/CVE-2019-6447
- https://github.com/codeonlinux/esexplorervuln
- https://github.com/crypticdante/CVE-2019-6447
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/e-hakson/OSCP
- https://github.com/eljosep/OSCP-Guide
- https://github.com/febinrev/CVE-2019-6447-ESfile-explorer-exploit
- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/julio-cfa/POC-ES-File-Explorer-CVE-2019-6447
- https://github.com/k4u5h41/CVE-2019-6447
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/mooyoul/awesome-stars
- https://github.com/n3ov4n1sh/CVE-2019-6447
- https://github.com/nitishbadole/oscp-note-3
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oscpname/OSCP_cheat
- https://github.com/revanmalang/OSCP
- https://github.com/svg153/awesome-stars
- https://github.com/txuswashere/OSCP
- https://github.com/vino-theva/CVE-2019-6447
- https://github.com/volysandro/cve_2019-6447
- https://github.com/x00tex/hackTheBox
- https://github.com/xhref/OSCP