Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lock vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2009-1587
index.php in PHP Site Lock 2.0 allows remote malicious users to bypass authentication and obtain administrative access by setting the login_id, group_id, login_name, user_id, and user_type cookies to certain values.
Kalptarudemos Php Site Lock 2.0
1 EDB exploit
NA
CVE-2023-2863
A vulnerability has been found in Simple Design Daily Journal 1.012.GP.B on Android and classified as problematic. Affected by this vulnerability is an unknown functionality of the component SQLite Database. The manipulation leads to cleartext storage in a file or on disk. It is ...
Simpledesign Diary With Lock\\ Daily Journal
481
VMScore
CVE-2014-7048
The Bear ID Lock (aka com.wBearIDLock) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Bearidlock Bear Id Lock 0.1
445
VMScore
CVE-2017-15581
In the "Diary with lock" (aka WriteDiary) application 4.72 for Android, neither HTTPS nor other encryption is used for transmitting data, despite the documentation that the product is intended for "a personal journal of ... secrets and feelings," which allows ...
Writediary Diary With Lock 4.72
445
VMScore
CVE-2017-15582
In net.MCrypt in the "Diary with lock" (aka WriteDiary) application 4.72 for Android, hardcoded SecretKey and iv variables are used for the AES parameters, which makes it easier for malicious users to obtain the cleartext of stored diary entries.
Writediary Diary With Lock 4.72
755
VMScore
CVE-2008-2865
SQL injection vulnerability in index.php in Kalptaru Infotech PHP Site Lock 2.0 allows remote malicious users to execute arbitrary SQL commands via the articleid parameter in a show_article action.
Kalptaru Infotech Php Site Lock 2.0
1 EDB exploit
384
VMScore
CVE-2019-11334
An authentication bypass in website post requests in the Tzumi Electronics Klic Lock application 1.0.9 for mobile devices allows malicious users to access resources (that are not otherwise accessible without proper authentication) via capture-replay. Physically proximate attacker...
Tzumi Klic Lock 1.0.9
Tzumi Klic Smart Padlock Model 5686 Firmware 6.2
2 Github repositories
187
VMScore
CVE-2005-2879
Advansysperu Software USB Lock Auto-Protect (AP) 1.5 uses a weak encryption scheme to encrypt passwords, which allows local users to gain sensitive information and bypass USB interface protection.
Advansysperu Software Usb Lock Auto-protect 1.5
258
VMScore
CVE-2018-16242
oBike relies on Hangzhou Luoping Smart Locker to lock bicycles, which allows malicious users to bypass the locking mechanism by using Bluetooth Low Energy (BLE) to replay ciphertext based on a predictable nonce used in the locking protocol.
O.bike Smart Locker Firmware -
O.bike Obike-stationless Bike Sharing 2.5.4
1 Github repository
NA
CVE-2018-162422018
oBike Electronic Lock suffers from an access control bypass vulnerability via a replay attack on a predictable nonce.
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »