Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
garage vulnerabilities and exploits
(subscribe to this query)
8.2
CVSSv3
CVE-2023-5881
Unauthenticated access permitted to web interface page The Genie Company Aladdin Connect (Retrofit-Kit Model ALDCM) "Garage Door Control Module Setup" and modify the Garage door's SSID settings.
Geniecompany Aladdin Connect Garage Door Opener Firmware
8.8
CVSSv3
CVE-2023-5880
When the Genie Company Aladdin Connect garage door opener (Retrofit-Kit Model ALDCM) is placed into configuration mode the web servers “Garage Door Control Module Setup” page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Jav...
Geniecompany Aladdin Connect Garage Door Opener Firmware
6.5
CVSSv3
CVE-2020-12280
iSmartgate PRO 1.5.9 is vulnerable to CSRF that allows remote malicious users to open/close a specified garage door/gate via /isg/opendoor.php.
Gogogate Ismartgate Pro Firmware 1.5.9
7.5
CVSSv3
CVE-2020-12837
ismartgate PRO 1.5.9 is vulnerable to malicious file uploads via the form for uploading images to garage doors. The magic bytes of PNG must be used.
Gogogate Ismartgate Pro Firmware 1.5.9
9.8
CVSSv3
CVE-2020-12843
ismartgate PRO 1.5.9 is vulnerable to malicious file uploads via the form for uploading sounds to garage doors. The magic bytes for WAV must be used.
Gogogate Ismartgate Pro Firmware 1.5.9
6.5
CVSSv3
CVE-2017-17910
On Hoermann BiSecur devices prior to 2018, a vulnerability can be exploited by recording a single radio transmission. An attacker can intercept an arbitrary radio frame exchanged between a BiSecur transmitter and a receiver to obtain the encrypted packet and the 32-bit serial num...
Hoermann Hs5-868-bs Firmware -
Hoermann Hse2-868-bs Firmware -
Hoermann Hse1-868-bs Firmware -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4