Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
alarm vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-50123
The number of attempts to bring the Hozard Alarm system (alarmsystemen) v1.0 to a disarmed state is not limited. This could allow an malicious user to perform a brute force on the SMS authentication, to bring the alarm system to a disarmed state.
Hozard Alarm System 1.0
NA
CVE-2023-50125
A default engineer password set on the Hozard alarm system (Alarmsysteem) v1.0 allows an malicious user to bring the alarm system to a disarmed state.
Hozard Alarm System 1.0
NA
CVE-2023-50126
Missing encryption in the RFID tags of the Hozard alarm system (Alarmsysteem) v1.0 allow malicious users to create a cloned tag via brief physical proximity to one of the original tags, which results in an attacker being able to bring the alarm system to a disarmed state.
Hozard Alarm System 1.0
NA
CVE-2023-50127
Hozard alarm system (Alarmsysteem) v1.0 is vulnerable to Improper Authentication. Commands sent via the SMS functionality are accepted from random phone numbers, which allows an malicious user to bring the alarm system to a disarmed state from any given phone number.
Hozard Alarm System 1.0
NA
CVE-2023-50128
The remote keyless system of the Hozard alarm system (alarmsystemen) v1.0 sends an identical radio frequency signal for each request, which results in an attacker being able to conduct replay attacks to bring the alarm system to a disarmed state.
Hozard Alarm System 1.0
9
CVSSv2
CVE-2018-19588
Alarm.com ADC-V522IR 0100b9 devices have Incorrect Access Control.
Alarm Adc-v522ir Firmware 0100b9
4.6
CVSSv2
CVE-2019-9657
Alarm.com ADC-V522IR 0100b9 devices have Incorrect Access Control, a different issue than CVE-2018-19588. This occurs because of incorrect protection of VPN certificates (used for initiating a VPN session to the Alarm.com infrastructure) on the local camera device.
Alarm Adc-v522ir Firmware 0100b9
5.4
CVSSv2
CVE-2014-7124
The IP Alarm (aka com.cosesy.gadget.alarm) application 1.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Consulo Ip Alarm 1.4
NA
CVE-2023-29739
An issue found in Alarm Clock for Heavy Sleepers v.5.3.2 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the component.
Amdroidapp Alarm Clock For Heavy Sleepers 5.3.2
NA
CVE-2023-29740
An issue found in Alarm Clock for Heavy Sleepers v.5.3.2 for Android allows unauthorized apps to cause a denial of service attack by manipulating the database.
Amdroidapp Alarm Clock For Heavy Sleepers 5.3.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »