Vulnerabilities (CVE)

Filtered by vendor Lenovo Subscribe
Filtered by product Shareit
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-4782 2 Google, Lenovo 2 Android, Shareit 2024-02-04 9.3 HIGH 8.8 HIGH
Lenovo SHAREit before 3.5.98_ww on Android before 4.2 allows remote attackers to have unspecified impact via a crafted intent: URL, aka an "intent scheme URL attack."
CVE-2016-1492 1 Lenovo 1 Shareit 2024-02-04 2.9 LOW 6.1 MEDIUM
The Wifi hotspot in Lenovo SHAREit before 3.5.48_ww for Android, when configured to receive files, does not require a password, which makes it easier for remote attackers to obtain access by leveraging a position within the WLAN coverage area.
CVE-2016-1491 1 Lenovo 1 Shareit 2024-02-04 5.4 MEDIUM 8.8 HIGH
The Wifi hotspot in Lenovo SHAREit before 3.2.0 for Windows, when configured to receive files, has a hardcoded password of 12345678, which makes it easier for remote attackers to obtain access by leveraging a position within the WLAN coverage area.
CVE-2016-1490 1 Lenovo 1 Shareit 2024-02-04 2.7 LOW 4.1 MEDIUM
The Wifi hotspot in Lenovo SHAREit before 3.2.0 for Windows allows remote attackers to obtain sensitive file names via a crafted file request to /list.
CVE-2016-4783 2 Google, Lenovo 2 Android, Shareit 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
Cross-site scripting (XSS) vulnerability in Lenovo SHAREit before 3.5.98_ww on Android before 4.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."
CVE-2016-1489 1 Lenovo 1 Shareit 2024-02-04 4.3 MEDIUM 8.0 HIGH
Lenovo SHAREit before 3.2.0 for Windows and SHAREit before 3.5.48_ww for Android transfer files in cleartext, which allows remote attackers to (1) obtain sensitive information by sniffing the network or (2) conduct man-in-the-middle (MITM) attacks via unspecified vectors.
CVE-2014-1939 2 Google, Lenovo 2 Android, Shareit 2024-02-04 7.5 HIGH N/A
java/android/webkit/BrowserFrame.java in Android before 4.4 uses the addJavascriptInterface API in conjunction with creating an object of the SearchBoxImpl class, which allows attackers to execute arbitrary Java code by leveraging access to the searchBoxJavaBridge_ interface at certain Android API levels.