Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lock vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2023-2863
A vulnerability has been found in Simple Design Daily Journal 1.012.GP.B on Android and classified as problematic. Affected by this vulnerability is an unknown functionality of the component SQLite Database. The manipulation leads to cleartext storage in a file or on disk. It is ...
Simpledesign Diary With Lock\\ Daily Journal
NA
CVE-2009-1587
index.php in PHP Site Lock 2.0 allows remote malicious users to bypass authentication and obtain administrative access by setting the login_id, group_id, login_name, user_id, and user_type cookies to certain values.
Kalptarudemos Php Site Lock 2.0
1 EDB exploit
7.5
CVSSv3
CVE-2017-15581
In the "Diary with lock" (aka WriteDiary) application 4.72 for Android, neither HTTPS nor other encryption is used for transmitting data, despite the documentation that the product is intended for "a personal journal of ... secrets and feelings," which allows ...
Writediary Diary With Lock 4.72
7.5
CVSSv3
CVE-2017-15582
In net.MCrypt in the "Diary with lock" (aka WriteDiary) application 4.72 for Android, hardcoded SecretKey and iv variables are used for the AES parameters, which makes it easier for malicious users to obtain the cleartext of stored diary entries.
Writediary Diary With Lock 4.72
NA
CVE-2014-7048
The Bear ID Lock (aka com.wBearIDLock) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Bearidlock Bear Id Lock 0.1
NA
CVE-2008-2865
SQL injection vulnerability in index.php in Kalptaru Infotech PHP Site Lock 2.0 allows remote malicious users to execute arbitrary SQL commands via the articleid parameter in a show_article action.
Kalptaru Infotech Php Site Lock 2.0
1 EDB exploit
3.7
CVSSv3
CVE-2019-11334
An authentication bypass in website post requests in the Tzumi Electronics Klic Lock application 1.0.9 for mobile devices allows malicious users to access resources (that are not otherwise accessible without proper authentication) via capture-replay. Physically proximate attacker...
Tzumi Klic Lock 1.0.9
Tzumi Klic Smart Padlock Model 5686 Firmware 6.2
2 Github repositories
NA
CVE-2005-2879
Advansysperu Software USB Lock Auto-Protect (AP) 1.5 uses a weak encryption scheme to encrypt passwords, which allows local users to gain sensitive information and bypass USB interface protection.
Advansysperu Software Usb Lock Auto-protect 1.5
5.3
CVSSv3
CVE-2018-16242
oBike relies on Hangzhou Luoping Smart Locker to lock bicycles, which allows malicious users to bypass the locking mechanism by using Bluetooth Low Energy (BLE) to replay ciphertext based on a predictable nonce used in the locking protocol.
O.bike Smart Locker Firmware -
O.bike Obike-stationless Bike Sharing 2.5.4
1 Github repository
NA
CVE-2018-162422018
oBike Electronic Lock suffers from an access control bypass vulnerability via a replay attack on a predictable nonce.
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »