Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wave vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv3
CVE-2021-1551
Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote malicious user to perform command injection attacks against an affected device. These vulnerabilitie...
Cisco Wap125 Firmware
Cisco Wap131 Firmware
Cisco Wap150 Firmware
Cisco Wap351 Firmware
Cisco Wap361 Firmware
Cisco Wap581 Firmware
7.2
CVSSv3
CVE-2021-1552
Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote malicious user to perform command injection attacks against an affected device. These vulnerabilitie...
Cisco Wap125 Firmware
Cisco Wap131 Firmware
Cisco Wap150 Firmware
Cisco Wap351 Firmware
Cisco Wap361 Firmware
Cisco Wap581 Firmware
7.8
CVSSv3
CVE-2023-35960
Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability conce...
Tonybybell Gtkwave 3.3.115
7.8
CVSSv3
CVE-2023-35961
Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability conce...
Tonybybell Gtkwave 3.3.115
8.1
CVSSv3
CVE-2020-9058
Z-Wave devices based on Silicon Labs 500 series chipsets using CRC-16 encapsulation, including but likely not limited to the Linear LB60Z-1 version 3.5, Dome DM501 version 4.26, and Jasco ZW4201 version 4.05, do not implement encryption or replay protection.
Silabs 500 Series Firmware
Dome Dm501 4.26
Jasco Zw4201 4.05
Linear Lb60z-1 3.5
6.5
CVSSv3
CVE-2020-9059
Z-Wave devices based on Silicon Labs 500 series chipsets using S0 authentication are susceptible to uncontrolled resource consumption leading to battery exhaustion. As an example, the Schlage BE468 version 3.42 door lock is vulnerable and fails open at a low battery level.
Silabs 500 Series Firmware
Schlage Be468 3.42
8.1
CVSSv3
CVE-2018-25029
The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.
Silabs Zgm130s037hgn Firmware S2
Silabs Zm5202 Firmware S2
Silabs Zm5101 Firmware S2
Silabs Zgm2305a27hgn Firmware S2
Silabs Zgm230sb27hgn Firmware S2
7.8
CVSSv3
CVE-2023-35962
Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability conce...
Tonybybell Gtkwave 3.3.115
7.8
CVSSv3
CVE-2023-35963
Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability conce...
Tonybybell Gtkwave 3.3.115
7.8
CVSSv3
CVE-2023-35964
Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability conce...
Tonybybell Gtkwave 3.3.115
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »