A vulnerability, which was classified as very critical, was found in Netgear D6220, D6400, D7000v2, D7800, D8500, DC112A, DGN2200v4, RBK50, RBR50, RBS50, RBK20, RBR20, RBS20, RBK40, RBR40, RBS40, R6020, R6080, R6120, R6220, R6230, R6250, R6260, R6850, R6350, R6400v2, R6700v3, R6700v2, R6800, R6900v2, R7000, R6900P, R7000P, R7100LG, R7200, R7350, R7400, R7450, AC2100, AC2400, AC2600, R7500v2, R7800, R7900, R7960P, R8000, R7900P, R8000P, R8900, R9000, RAX120, RBK752, RBR750, RBS750, RBK852, RBR850, RBS850, WNR3500Lv2, XR450 and XR500 (Wireless LAN Software). Affected is an unknown code block. Upgrading eliminates this vulnerability.
Netgear XR500 access control [CVE-2021-38516]
- Virtual Patching
- August 11, 2021
- 1:04 pm
CVE-2024-9473 : PALO ALTO GLOBALPROTECT APP UP TO 5.1/6.1/6.2.4/6.3 ON WINDOWS REPAIR UNNECESSARY PRIVILEGES
Description A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows
CVE-2024-9463 : PALO ALTO EXPEDITION UP TO 1.2.95 DEVICE CONFIGURATION OS COMMAND INJECTION
Description An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands
CVE-2024-47763 : BYTECODEALLIANCE WASMTIME UP TO 21.0.1/22.0.0/23.0.2/24.0.0/25.0.1 CONTROL FLOW
Description Wasmtime is an open source runtime for WebAssembly. Wasmtime’s implementation of WebAssembly tail calls combined with stack traces can