Vulnerabilities > Netgear > D6000 Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-04-16 | CVE-2019-20709 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20708 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20705 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20704 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20703 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20702 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20701 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20691 | Cross-Site Request Forgery (CSRF) vulnerability in Netgear products Certain NETGEAR devices are affected by CSRF. | 8.8 |
2020-04-16 | CVE-2019-20689 | Command Injection vulnerability in Netgear products Certain NETGEAR devices are affected by command injection by an authenticated user. | 6.8 |
2020-04-16 | CVE-2019-20688 | Command Injection vulnerability in Netgear products Certain NETGEAR devices are affected by command injection by an authenticated user. | 6.8 |