Vulnerabilities > Airdroid > Airdroid

DATE CVE VULNERABILITY TITLE RISK
2019-03-06 CVE-2019-9599 Improper Input Validation vulnerability in Airdroid
The AirDroid application through 4.2.1.6 for Android allows remote attackers to cause a denial of service (service crash) via many simultaneous sdctl/comm/lite_auth/ requests.
network
low complexity
airdroid CWE-20
7.8
2015-10-18 CVE-2015-5661 Information Exposure vulnerability in Airdroid
The SAND STUDIO AirDroid application 1.1.0 and earlier for Android mishandles implicit intents, which allows attackers to obtain sensitive information via a crafted application.
network
airdroid CWE-200
4.3
2013-04-09 CVE-2013-0134 Cross-Site Scripting vulnerability in Airdroid
Cross-site scripting (XSS) vulnerability in the web interface in AirDroid allows remote attackers to inject arbitrary web script or HTML via a crafted text message that is transmitted by a managed phone.
network
airdroid CWE-79
4.3
2012-07-26 CVE-2012-3888 Permissions, Privileges, and Access Controls vulnerability in Airdroid 1.0.4
The login implementation in AirDroid 1.0.4 beta allows remote attackers to bypass a multiple-login protection mechanism by modifying a pass value within JSON data.
network
low complexity
airdroid CWE-264
5.0
2012-07-26 CVE-2012-3887 Cryptographic Issues vulnerability in Airdroid
AirDroid before 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote attackers to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SMS message content sent to the sdctl/sms/send/single/ URI.
network
low complexity
airdroid CWE-310
5.0
2012-07-26 CVE-2012-3886 Information Exposure vulnerability in Airdroid 1.0.4
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.
network
low complexity
airdroid CWE-200
5.0
2012-07-26 CVE-2012-3885 Improper Authentication vulnerability in Airdroid 1.0.4
The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote attackers to obtain access via a brute-force attack.
network
low complexity
airdroid CWE-287
7.5
2012-07-26 CVE-2012-3884 Improper Authentication vulnerability in Airdroid 1.0.4
AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote attackers to obtain access by sniffing the local wireless network and then replaying the authentication data.
network
low complexity
airdroid CWE-287
5.0