Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
airdroid airdroid - vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2012-3887
AirDroid prior to 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote malicious users to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SM...
Airdroid Airdroid 1.0.5
Airdroid Airdroid 1.0.3
Airdroid Airdroid
Airdroid Airdroid 1.0.4
Airdroid Airdroid 1.0.2
Airdroid Airdroid 1.0.1
4.3
CVSSv2
CVE-2013-0134
Cross-site scripting (XSS) vulnerability in the web interface in AirDroid allows remote malicious users to inject arbitrary web script or HTML via a crafted text message that is transmitted by a managed phone.
Airdroid Airdroid -
4.3
CVSSv2
CVE-2015-5661
The SAND STUDIO AirDroid application 1.1.0 and previous versions for Android mishandles implicit intents, which allows malicious users to obtain sensitive information via a crafted application.
Airdroid Airdroid
7.8
CVSSv2
CVE-2019-9599
The AirDroid application up to and including 4.2.1.6 for Android allows remote malicious users to cause a denial of service (service crash) via many simultaneous sdctl/comm/lite_auth/ requests.
Airdroid Airdroid
1 Github repository
7.5
CVSSv2
CVE-2012-3885
The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Airdroid Airdroid 1.0.4
5
CVSSv2
CVE-2012-3884
AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote malicious users to obtain access by sniffing the local wireless network and then replaying the authentication data.
Airdroid Airdroid 1.0.4
5
CVSSv2
CVE-2012-3886
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote malicious users to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table...
Airdroid Airdroid 1.0.4
5
CVSSv2
CVE-2012-3888
The login implementation in AirDroid 1.0.4 beta allows remote malicious users to bypass a multiple-login protection mechanism by modifying a pass value within JSON data.
Airdroid Airdroid 1.0.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started