Search criteria
3 vulnerabilities found for andexplorer by lyesoft
FKIE_CVE-2014-1974
Vulnerability from fkie_nvd - Published: 2014-04-19 19:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Directory traversal vulnerability in the LYSESOFT AndExplorer application before 20140403 and AndExplorerPro application before 20140405 for Android allows attackers to overwrite or create arbitrary files via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| lyesoft | andexplorer | 1.0 | |
| lyesoft | andexplorer | 1.0 | |
| lyesoft | andexplorer | 1.1 | |
| lyesoft | andexplorer | 1.1 | |
| lyesoft | andexplorer | 1.2 | |
| lyesoft | andexplorer | 1.2 | |
| lyesoft | andexplorer | 1.3 | |
| lyesoft | andexplorer | 1.3 | |
| lyesoft | andexplorer | 1.4 | |
| lyesoft | andexplorer | 1.4 | |
| lyesoft | andexplorer | 1.5 | |
| lyesoft | andexplorer | 1.5 | |
| lyesoft | andexplorer | 1.6 | |
| lyesoft | andexplorer | 1.6 | |
| lyesoft | andexplorer | 1.7 | |
| lyesoft | andexplorer | 1.7 | |
| lyesoft | andexplorer | 1.8 | |
| lyesoft | andexplorer | 1.8 | |
| lyesoft | andexplorer | 1.9 | |
| lyesoft | andexplorer | 1.9 | |
| lyesoft | andexplorer | 2.0 | |
| lyesoft | andexplorer | 2.1 | |
| lyesoft | andexplorer | 2.1 | |
| lyesoft | andexplorer | 2.2 | |
| lyesoft | andexplorer | 2.2 | |
| lyesoft | andexplorer | 2.3 | |
| lyesoft | andexplorer | 2.3 | |
| lyesoft | andexplorer | 2.4 | |
| lyesoft | andexplorer | 2.4 | |
| lyesoft | andexplorer | 2.5 | |
| lyesoft | andexplorer | 3.0 | |
| lyesoft | andexplorer | 3.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.0:*:*:*:*:android:*:*",
"matchCriteriaId": "75982C3E-ADE3-4F4D-A82C-B02724C5C90C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.0:*:*:*:professional:android:*:*",
"matchCriteriaId": "BA42C36F-C265-4AF9-96D3-90CADA51E75E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.1:*:*:*:*:android:*:*",
"matchCriteriaId": "57516594-9FC6-4E7B-AE7E-CEE4521D7C85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.1:*:*:*:professional:android:*:*",
"matchCriteriaId": "2D1240B5-5730-4B51-B0F5-40AE8EDEEC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.2:*:*:*:*:android:*:*",
"matchCriteriaId": "758C7D60-94C3-4F67-82B6-B802A34C332A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.2:*:*:*:professional:android:*:*",
"matchCriteriaId": "3755FE3E-8732-4369-86B2-C7F75FC0AA9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.3:*:*:*:*:android:*:*",
"matchCriteriaId": "7E392B84-C406-4238-8AA1-9B98DCE20D91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.3:*:*:*:professional:android:*:*",
"matchCriteriaId": "75261EDC-3949-4E11-8BAB-973F143E67BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.4:*:*:*:*:android:*:*",
"matchCriteriaId": "52D541B0-6E38-4B34-9F09-9DABD9D994C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.4:*:*:*:professional:android:*:*",
"matchCriteriaId": "AB78FB20-B418-479A-A1E4-01F41C46C78C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.5:*:*:*:*:android:*:*",
"matchCriteriaId": "4BF6D448-BDB7-4EED-AD84-487D9FFC80C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.5:*:*:*:professional:android:*:*",
"matchCriteriaId": "84A34BB3-B4C8-47AE-80B5-51ABD898A13F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.6:*:*:*:*:android:*:*",
"matchCriteriaId": "734E9A7A-DED1-4E4A-B715-63B788BC9D1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.6:*:*:*:professional:android:*:*",
"matchCriteriaId": "3D95EF0E-78C8-41F9-B827-75B788E82AD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.7:*:*:*:*:android:*:*",
"matchCriteriaId": "D739AB41-DE1B-45B4-87DF-43401527F9E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.7:*:*:*:professional:android:*:*",
"matchCriteriaId": "82F802D3-3920-4F70-BB45-1493A7C53247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.8:*:*:*:*:android:*:*",
"matchCriteriaId": "F959DE16-CB44-4D23-A2AA-3A52563754A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.8:*:*:*:professional:android:*:*",
"matchCriteriaId": "CFCE534A-D922-4D9B-B094-06C02CF95D7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.9:*:*:*:*:android:*:*",
"matchCriteriaId": "BF45227B-5999-47B5-B936-2D400A303EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:1.9:*:*:*:professional:android:*:*",
"matchCriteriaId": "C72FE3B3-B602-42C0-B72B-AF9CCCE7EF0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:2.0:*:*:*:professional:android:*:*",
"matchCriteriaId": "3D1E0E3D-6549-4E23-9C9F-C0899D45A214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:2.1:*:*:*:*:android:*:*",
"matchCriteriaId": "D00F8121-5597-40DD-A0E1-4814D0622811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:2.1:*:*:*:professional:android:*:*",
"matchCriteriaId": "96044862-98AE-4AE8-8A5A-23B8119BDDEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:2.2:*:*:*:*:android:*:*",
"matchCriteriaId": "21F8CA16-A063-49A8-B3D6-2A9B7DF0A480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:2.2:*:*:*:professional:android:*:*",
"matchCriteriaId": "8AE43B25-C79B-43BC-9EF1-44D16619D8AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:2.3:*:*:*:*:android:*:*",
"matchCriteriaId": "0AB8986C-67DF-4E4E-AD71-EE3BFDAA6D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:2.3:*:*:*:professional:android:*:*",
"matchCriteriaId": "9A3421A2-63E3-4F5D-84A9-9118331B32F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:2.4:*:*:*:*:android:*:*",
"matchCriteriaId": "6F6AA649-A25E-42F4-8913-E5FA8FE88E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:2.4:*:*:*:professional:android:*:*",
"matchCriteriaId": "678D5A49-92E6-4DF5-8C0A-8778D1FEEE2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:2.5:*:*:*:*:android:*:*",
"matchCriteriaId": "6F41F2C4-0E0E-4E26-85F0-10DD447BF2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:3.0:*:*:*:*:android:*:*",
"matchCriteriaId": "A1EC1EBD-E357-4577-9DF4-CE8483B1A09C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lyesoft:andexplorer:3.0:*:*:*:professional:android:*:*",
"matchCriteriaId": "0656C4E2-DF4A-4E9D-8940-9708DBECEEB5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the LYSESOFT AndExplorer application before 20140403 and AndExplorerPro application before 20140405 for Android allows attackers to overwrite or create arbitrary files via unspecified vectors."
},
{
"lang": "es",
"value": "Una vulnerabilidad de salto de directorio en la aplicaci\u00f3n AndExplorer anterior a la versi\u00f3n 20140403 y la aplicaci\u00f3n AndExplorerPro anterior a versi\u00f3n 20140405 de LYSESOFT para Android, permite a los atacantes sobrescribir o crear archivos arbitrarios por medio de vectores no especificados."
}
],
"id": "CVE-2014-1974",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-04-19T19:55:07.640",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN22670349/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000037"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorer"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorerpro"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN22670349/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorer"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorerpro"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-1974 (GCVE-0-2014-1974)
Vulnerability from cvelistv5 – Published: 2014-04-19 19:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
Directory traversal vulnerability in the LYSESOFT AndExplorer application before 20140403 and AndExplorerPro application before 20140405 for Android allows attackers to overwrite or create arbitrary files via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:16.260Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorer"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorerpro"
},
{
"name": "JVN#22670349",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN22670349/index.html"
},
{
"name": "JVNDB-2014-000037",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000037"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the LYSESOFT AndExplorer application before 20140403 and AndExplorerPro application before 20140405 for Android allows attackers to overwrite or create arbitrary files via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-04-19T19:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorer"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorerpro"
},
{
"name": "JVN#22670349",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN22670349/index.html"
},
{
"name": "JVNDB-2014-000037",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000037"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-1974",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in the LYSESOFT AndExplorer application before 20140403 and AndExplorerPro application before 20140405 for Android allows attackers to overwrite or create arbitrary files via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://play.google.com/store/apps/details?id=lysesoft.andexplorer",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorer"
},
{
"name": "https://play.google.com/store/apps/details?id=lysesoft.andexplorerpro",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorerpro"
},
{
"name": "JVN#22670349",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN22670349/index.html"
},
{
"name": "JVNDB-2014-000037",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000037"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-1974",
"datePublished": "2014-04-19T19:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:16.260Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1974 (GCVE-0-2014-1974)
Vulnerability from nvd – Published: 2014-04-19 19:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
Directory traversal vulnerability in the LYSESOFT AndExplorer application before 20140403 and AndExplorerPro application before 20140405 for Android allows attackers to overwrite or create arbitrary files via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:16.260Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorer"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorerpro"
},
{
"name": "JVN#22670349",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN22670349/index.html"
},
{
"name": "JVNDB-2014-000037",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000037"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the LYSESOFT AndExplorer application before 20140403 and AndExplorerPro application before 20140405 for Android allows attackers to overwrite or create arbitrary files via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-04-19T19:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorer"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorerpro"
},
{
"name": "JVN#22670349",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN22670349/index.html"
},
{
"name": "JVNDB-2014-000037",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000037"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-1974",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in the LYSESOFT AndExplorer application before 20140403 and AndExplorerPro application before 20140405 for Android allows attackers to overwrite or create arbitrary files via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://play.google.com/store/apps/details?id=lysesoft.andexplorer",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorer"
},
{
"name": "https://play.google.com/store/apps/details?id=lysesoft.andexplorerpro",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=lysesoft.andexplorerpro"
},
{
"name": "JVN#22670349",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN22670349/index.html"
},
{
"name": "JVNDB-2014-000037",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000037"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-1974",
"datePublished": "2014-04-19T19:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:16.260Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}