Логотип exploitDog
bind:CVE-2019-6447
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-6447

Количество 2

Количество 2

nvd логотип

CVE-2019-6447

около 7 лет назад

The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.

CVSS3: 8.1
EPSS: Высокий
github логотип

GHSA-2pqf-jwpx-hmhw

больше 3 лет назад

The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.

CVSS3: 8.1
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-6447

The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.

CVSS3: 8.1
78%
Высокий
около 7 лет назад
github логотип
GHSA-2pqf-jwpx-hmhw

The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.

CVSS3: 8.1
78%
Высокий
больше 3 лет назад

Уязвимостей на страницу