Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2012-3888
Disclosure Date: July 26, 2012 (last updated October 04, 2023)
The login implementation in AirDroid 1.0.4 beta allows remote attackers to bypass a multiple-login protection mechanism by modifying a pass value within JSON data.
0
Attacker Value
Unknown
CVE-2012-3887
Disclosure Date: July 26, 2012 (last updated October 04, 2023)
AirDroid before 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote attackers to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SMS message content sent to the sdctl/sms/send/single/ URI.
0
Attacker Value
Unknown
CVE-2012-3885
Disclosure Date: July 26, 2012 (last updated October 04, 2023)
The default configuration of AirDroid 1.0.4 beta uses a four-character alphanumeric password, which makes it easier for remote attackers to obtain access via a brute-force attack.
0
Attacker Value
Unknown
CVE-2012-3886
Disclosure Date: July 26, 2012 (last updated October 04, 2023)
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.
0
Attacker Value
Unknown
CVE-2012-3884
Disclosure Date: July 26, 2012 (last updated October 04, 2023)
AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote attackers to obtain access by sniffing the local wireless network and then replaying the authentication data.
0