CVE-2019-9599
- EPSS 20.06%
- Veröffentlicht 06.03.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:51:56
The AirDroid application through 4.2.1.6 for Android allows remote attackers to cause a denial of service (service crash) via many simultaneous sdctl/comm/lite_auth/ requests.
CVE-2015-5661
- EPSS 0.23%
- Veröffentlicht 18.10.2015 19:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
The SAND STUDIO AirDroid application 1.1.0 and earlier for Android mishandles implicit intents, which allows attackers to obtain sensitive information via a crafted application.
CVE-2013-0134
- EPSS 0.59%
- Veröffentlicht 09.04.2013 03:34:53
- Zuletzt bearbeitet 11.04.2025 00:51:21
Cross-site scripting (XSS) vulnerability in the web interface in AirDroid allows remote attackers to inject arbitrary web script or HTML via a crafted text message that is transmitted by a managed phone.
- EPSS 0.31%
- Veröffentlicht 26.07.2012 22:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote attackers to obtain access by sniffing the local wireless network and then replaying the authentication data.
CVE-2012-3885
- EPSS 0.43%
- Veröffentlicht 26.07.2012 22:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote attackers to obtain access via a brute-force attack.
- EPSS 0.25%
- Veröffentlicht 26.07.2012 22:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force att...
- EPSS 0.25%
- Veröffentlicht 26.07.2012 22:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
AirDroid before 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote attackers to obtain sensitive information by sniffing the local wireless network, as demonstrat...
- EPSS 0.17%
- Veröffentlicht 26.07.2012 22:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
The login implementation in AirDroid 1.0.4 beta allows remote attackers to bypass a multiple-login protection mechanism by modifying a pass value within JSON data.