PoC-in-GitHub/2019/CVE-2019-6447.json
2023-02-13 03:30:01 +09:00

355 lines
No EOL
13 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 164948400,
"name": "ESFileExplorerOpenPortVuln",
"full_name": "fs0c131y\/ESFileExplorerOpenPortVuln",
"owner": {
"login": "fs0c131y",
"id": 36547191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36547191?v=4",
"html_url": "https:\/\/github.com\/fs0c131y"
},
"html_url": "https:\/\/github.com\/fs0c131y\/ESFileExplorerOpenPortVuln",
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2023-01-16T09:53:26Z",
"pushed_at": "2021-09-01T08:56:40Z",
"stargazers_count": 664,
"watchers_count": 664,
"has_discussions": false,
"forks_count": 136,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2019-6447",
"infosec",
"vulnerability"
],
"visibility": "public",
"forks": 136,
"watchers": 664,
"score": 0
},
{
"id": 263921419,
"name": "ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447",
"full_name": "SandaRuFdo\/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447",
"owner": {
"login": "SandaRuFdo",
"id": 49802268,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49802268?v=4",
"html_url": "https:\/\/github.com\/SandaRuFdo"
},
"html_url": "https:\/\/github.com\/SandaRuFdo\/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447",
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2020-05-14T13:22:54Z",
"updated_at": "2020-05-14T13:23:58Z",
"pushed_at": "2020-05-14T13:23:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 381078333,
"name": "CVE-2019-6447",
"full_name": "Nehal-Zaman\/CVE-2019-6447",
"owner": {
"login": "Nehal-Zaman",
"id": 70776749,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70776749?v=4",
"html_url": "https:\/\/github.com\/Nehal-Zaman"
},
"html_url": "https:\/\/github.com\/Nehal-Zaman\/CVE-2019-6447",
"description": "My exploit for ES Explorer Android App open port vulnerability.",
"fork": false,
"created_at": "2021-06-28T15:25:49Z",
"updated_at": "2021-11-15T09:35:02Z",
"pushed_at": "2021-06-28T15:31:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 384531590,
"name": "CVE-2019-6447",
"full_name": "k4u5h41\/CVE-2019-6447",
"owner": {
"login": "k4u5h41",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/k4u5h41"
},
"html_url": "https:\/\/github.com\/k4u5h41\/CVE-2019-6447",
"description": null,
"fork": false,
"created_at": "2021-07-09T19:21:29Z",
"updated_at": "2021-12-21T14:16:27Z",
"pushed_at": "2022-04-23T17:32:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 393840722,
"name": "POC-ES-File-Explorer-CVE-2019-6447",
"full_name": "julio-cfa\/POC-ES-File-Explorer-CVE-2019-6447",
"owner": {
"login": "julio-cfa",
"id": 52619625,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52619625?v=4",
"html_url": "https:\/\/github.com\/julio-cfa"
},
"html_url": "https:\/\/github.com\/julio-cfa\/POC-ES-File-Explorer-CVE-2019-6447",
"description": "Very basic bash script to exploit the CVE-2019-6447.",
"fork": false,
"created_at": "2021-08-08T02:54:25Z",
"updated_at": "2021-09-13T11:33:04Z",
"pushed_at": "2021-09-13T11:33:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 414617161,
"name": "CVE-2019-6447-ESfile-explorer-exploit",
"full_name": "febinrev\/CVE-2019-6447-ESfile-explorer-exploit",
"owner": {
"login": "febinrev",
"id": 52229330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4",
"html_url": "https:\/\/github.com\/febinrev"
},
"html_url": "https:\/\/github.com\/febinrev\/CVE-2019-6447-ESfile-explorer-exploit",
"description": "ES File Explorer v4.1.9.7.4 Open port vulnerability exploit. CVE-2019-6447 ",
"fork": false,
"created_at": "2021-10-07T13:41:06Z",
"updated_at": "2021-10-18T08:52:35Z",
"pushed_at": "2021-10-18T06:26:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 455045789,
"name": "CVE-2019-6447--.",
"full_name": "Kayky-cmd\/CVE-2019-6447--.",
"owner": {
"login": "Kayky-cmd",
"id": 68632856,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68632856?v=4",
"html_url": "https:\/\/github.com\/Kayky-cmd"
},
"html_url": "https:\/\/github.com\/Kayky-cmd\/CVE-2019-6447--.",
"description": null,
"fork": false,
"created_at": "2022-02-03T05:50:03Z",
"updated_at": "2022-02-03T05:50:17Z",
"pushed_at": "2022-02-03T05:50:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 503628259,
"name": "CVE-2019-6447-Android-Vulnerability-in-ES-File-Explorer",
"full_name": "VinuKalana\/CVE-2019-6447-Android-Vulnerability-in-ES-File-Explorer",
"owner": {
"login": "VinuKalana",
"id": 87648107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87648107?v=4",
"html_url": "https:\/\/github.com\/VinuKalana"
},
"html_url": "https:\/\/github.com\/VinuKalana\/CVE-2019-6447-Android-Vulnerability-in-ES-File-Explorer",
"description": "This repository is developed to understand CVE-2019-6447",
"fork": false,
"created_at": "2022-06-15T05:32:34Z",
"updated_at": "2022-06-15T05:32:34Z",
"pushed_at": "2022-06-15T05:34:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 509936375,
"name": "CVE-2019-6447",
"full_name": "Osuni-99\/CVE-2019-6447",
"owner": {
"login": "Osuni-99",
"id": 80031308,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80031308?v=4",
"html_url": "https:\/\/github.com\/Osuni-99"
},
"html_url": "https:\/\/github.com\/Osuni-99\/CVE-2019-6447",
"description": "The above investigation of the ES file browser security weakness allows us to see the issue in its entirety",
"fork": false,
"created_at": "2022-07-03T05:57:14Z",
"updated_at": "2022-07-03T05:57:14Z",
"pushed_at": "2022-07-03T05:57:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 511929182,
"name": "EsFileExplorer-CVE-2019-6447",
"full_name": "Chethine\/EsFileExplorer-CVE-2019-6447",
"owner": {
"login": "Chethine",
"id": 69776481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69776481?v=4",
"html_url": "https:\/\/github.com\/Chethine"
},
"html_url": "https:\/\/github.com\/Chethine\/EsFileExplorer-CVE-2019-6447",
"description": "Exploiting Android Vulnerability in ES File Explorer",
"fork": false,
"created_at": "2022-07-08T14:45:50Z",
"updated_at": "2022-08-15T20:15:09Z",
"pushed_at": "2022-07-08T15:58:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 520586287,
"name": "CVE-2019-6447",
"full_name": "vino-theva\/CVE-2019-6447",
"owner": {
"login": "vino-theva",
"id": 106059311,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106059311?v=4",
"html_url": "https:\/\/github.com\/vino-theva"
},
"html_url": "https:\/\/github.com\/vino-theva\/CVE-2019-6447",
"description": "This paper is about manual exploitation of android open port vulnerability found in ES file manager. This open TCP 59777 port allows the attacker to install a backdoor and gather all the users data. Further in this paper there will be a proof of concept presented to consolidate the vulnerability. Download the PDF and enjoy !!! Cheers !!!",
"fork": false,
"created_at": "2022-08-02T17:16:34Z",
"updated_at": "2022-08-02T17:16:35Z",
"pushed_at": "2022-08-02T17:22:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 577189013,
"name": "CVE-2019-6447-in-Mobile-Application",
"full_name": "KaviDk\/CVE-2019-6447-in-Mobile-Application",
"owner": {
"login": "KaviDk",
"id": 49784676,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49784676?v=4",
"html_url": "https:\/\/github.com\/KaviDk"
},
"html_url": "https:\/\/github.com\/KaviDk\/CVE-2019-6447-in-Mobile-Application",
"description": null,
"fork": false,
"created_at": "2022-12-12T07:10:51Z",
"updated_at": "2022-12-12T07:10:51Z",
"pushed_at": "2022-12-12T07:15:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]