Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
airdroid airdroid 1.0.4 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2012-3887
AirDroid prior to 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote malicious users to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SM...
Airdroid Airdroid 1.0.5
Airdroid Airdroid 1.0.3
Airdroid Airdroid
Airdroid Airdroid 1.0.4
Airdroid Airdroid 1.0.2
Airdroid Airdroid 1.0.1
445
VMScore
CVE-2012-3884
AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote malicious users to obtain access by sniffing the local wireless network and then replaying the authentication data.
Airdroid Airdroid 1.0.4
668
VMScore
CVE-2012-3885
The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Airdroid Airdroid 1.0.4
445
VMScore
CVE-2012-3886
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote malicious users to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table...
Airdroid Airdroid 1.0.4
445
VMScore
CVE-2012-3888
The login implementation in AirDroid 1.0.4 beta allows remote malicious users to bypass a multiple-login protection mechanism by modifying a pass value within JSON data.
Airdroid Airdroid 1.0.4
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started