Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
airdroid airdroid vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2012-3887
AirDroid prior to 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote malicious users to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SM...
Airdroid Airdroid 1.0.5
Airdroid Airdroid 1.0.3
Airdroid Airdroid
Airdroid Airdroid 1.0.4
Airdroid Airdroid 1.0.2
Airdroid Airdroid 1.0.1
383
VMScore
CVE-2015-5661
The SAND STUDIO AirDroid application 1.1.0 and previous versions for Android mishandles implicit intents, which allows malicious users to obtain sensitive information via a crafted application.
Airdroid Airdroid
694
VMScore
CVE-2019-9599
The AirDroid application up to and including 4.2.1.6 for Android allows remote malicious users to cause a denial of service (service crash) via many simultaneous sdctl/comm/lite_auth/ requests.
Airdroid Airdroid
1 Github repository
383
VMScore
CVE-2013-0134
Cross-site scripting (XSS) vulnerability in the web interface in AirDroid allows remote malicious users to inject arbitrary web script or HTML via a crafted text message that is transmitted by a managed phone.
Airdroid Airdroid -
445
VMScore
CVE-2012-3884
AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote malicious users to obtain access by sniffing the local wireless network and then replaying the authentication data.
Airdroid Airdroid 1.0.4
668
VMScore
CVE-2012-3885
The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Airdroid Airdroid 1.0.4
445
VMScore
CVE-2012-3886
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote malicious users to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table...
Airdroid Airdroid 1.0.4
445
VMScore
CVE-2012-3888
The login implementation in AirDroid 1.0.4 beta allows remote malicious users to bypass a multiple-login protection mechanism by modifying a pass value within JSON data.
Airdroid Airdroid 1.0.4
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started