Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
airdroid airdroid 1.0.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-3887
AirDroid prior to 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote malicious users to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SM...
Airdroid Airdroid 1.0.5
Airdroid Airdroid 1.0.3
Airdroid Airdroid
Airdroid Airdroid 1.0.4
Airdroid Airdroid 1.0.2
Airdroid Airdroid 1.0.1
NA
CVE-2012-3884
AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote malicious users to obtain access by sniffing the local wireless network and then replaying the authentication data.
Airdroid Airdroid 1.0.4
NA
CVE-2012-3885
The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Airdroid Airdroid 1.0.4
NA
CVE-2012-3886
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote malicious users to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table...
Airdroid Airdroid 1.0.4
NA
CVE-2012-3888
The login implementation in AirDroid 1.0.4 beta allows remote malicious users to bypass a multiple-login protection mechanism by modifying a pass value within JSON data.
Airdroid Airdroid 1.0.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started