Patching for Windows Mac Linux
CVE Vulnerabilities for AirDroid
CVE | Published | Severity | Details | Exploitability | Impact | Vector |
---|---|---|---|---|---|---|
CVE‑2019‑9599 | 2019‑03‑06 18:29:00 | HIGH (8) | The AirDroid application through 4.2.1.6 for Android allows remote attackers to cause a denial of service (service crash) via many simultaneous sdctl/comm/lite_auth/ requests. | 0 | 0 | NETWORK |
CVE‑2015‑5661 | 2015‑10‑18 19:59:00 | MEDIUM (4) | The SAND STUDIO AirDroid application 1.1.0 and earlier for Android mishandles implicit intents, which allows attackers to obtain sensitive information via a crafted application. | 0 | 0 | NETWORK |
CVE‑2013‑0134 | 2013‑04‑09 03:34:53 | MEDIUM (4) | Cross-site scripting (XSS) vulnerability in the web interface in AirDroid allows remote attackers to inject arbitrary web script or HTML via a crafted text message that is transmitted by a managed phone. | 0 | 0 | NETWORK |
CVE‑2012‑3888 | 2012‑07‑26 22:55:02 | MEDIUM (5) | The login implementation in AirDroid 1.0.4 beta allows remote attackers to bypass a multiple-login protection mechanism by modifying a pass value within JSON data. | 0 | 0 | NETWORK |
CVE‑2012‑3887 | 2012‑07‑26 22:55:02 | MEDIUM (5) | AirDroid before 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote attackers to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SMS message content sent to the sdctl/sms/send/single/ URI. | 0 | 0 | NETWORK |
CVE‑2012‑3886 | 2012‑07‑26 22:55:02 | MEDIUM (5) | AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack. | 0 | 0 | NETWORK |
CVE‑2012‑3885 | 2012‑07‑26 22:55:02 | HIGH (8) | The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote attackers to obtain access via a brute-force attack. | 0 | 0 | NETWORK |
CVE‑2012‑3884 | 2012‑07‑26 22:55:02 | MEDIUM (5) | AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote attackers to obtain access by sniffing the local wireless network and then replaying the authentication data. | 0 | 0 | NETWORK |
What applications does Lavawall® monitor?
Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.