Vulnerabilities > Netgear > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-04-16 | CVE-2019-20761 | Command Injection vulnerability in Netgear R7800 Firmware NETGEAR R7800 devices before 1.0.2.62 are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20760 | Unspecified vulnerability in Netgear R9000 Firmware NETGEAR R9000 devices before 1.0.4.26 are affected by authentication bypass. low complexity netgear | 8.8 |
2020-04-16 | CVE-2019-20758 | Classic Buffer Overflow vulnerability in Netgear R7000 Firmware NETGEAR R7000 devices before 1.0.9.42 are affected by a buffer overflow by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20753 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. | 8.8 |
2020-04-16 | CVE-2019-20739 | Classic Buffer Overflow vulnerability in Netgear R8500 Firmware NETGEAR R8500 devices before v1.0.2.128 are affected by a buffer overflow by an unauthenticated attacker. | 8.8 |
2020-04-16 | CVE-2019-20734 | Classic Buffer Overflow vulnerability in Netgear products Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. | 8.8 |
2020-04-16 | CVE-2019-20711 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20710 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20709 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |
2020-04-16 | CVE-2019-20708 | Command Injection vulnerability in Netgear D3600 Firmware, D6000 Firmware and Xr500 Firmware Certain NETGEAR devices are affected by command injection by an authenticated user. | 8.0 |