Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
airdroid airdroid 1.0.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-3887
AirDroid prior to 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote malicious users to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SM...
Airdroid Airdroid 1.0.5
Airdroid Airdroid 1.0.3
Airdroid Airdroid
Airdroid Airdroid 1.0.4
Airdroid Airdroid 1.0.2
Airdroid Airdroid 1.0.1
NA
CVE-2012-3886
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote malicious users to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table...
Airdroid Airdroid 1.0.4
NA
CVE-2012-3884
AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote malicious users to obtain access by sniffing the local wireless network and then replaying the authentication data.
Airdroid Airdroid 1.0.4
NA
CVE-2012-3885
The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Airdroid Airdroid 1.0.4
NA
CVE-2012-3888
The login implementation in AirDroid 1.0.4 beta allows remote malicious users to bypass a multiple-login protection mechanism by modifying a pass value within JSON data.
Airdroid Airdroid 1.0.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5274
CVE-2024-35388
CVE-2024-35396
elevation of privilege
CVE-2021-47544
file upload
CVE-2021-47545
memory leak
CVE-2024-4956
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started