Vulnerabilities > Huawei > Usg5100
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-04-02 | CVE-2014-9137 | Cross-Site Request Forgery (CSRF) vulnerability in Huawei products Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface. | 6.8 |
2017-04-02 | CVE-2014-9136 | Cross-Site Request Forgery (CSRF) vulnerability in Huawei products Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface. | 6.8 |
2016-10-03 | CVE-2016-8276 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Huawei products Buffer overflow in the Point-to-Point Protocol over Ethernet (PPPoE) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600, when CHAP authentication is configured on the server, allows remote attackers to cause a denial of service (server restart) or execute arbitrary code via crafted packets sent during authentication. | 9.3 |
2016-09-22 | CVE-2016-6669 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Huawei products Buffer overflow in the Authentication, Authorization and Accounting (AAA) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600 allows remote authenticated RADIUS servers to execute arbitrary code by sending a crafted EAP packet. | 7.1 |
2015-12-07 | CVE-2015-8084 | Improper Input Validation vulnerability in Huawei Unified Security Gateway Firmware V300R001C10 Huawei USG5500, USG2100, USG2200, and USG5100 unified security gateways with software before V300R001C10SPC600, when "DHCP Snooping" is enabled and either "option82 insert" or "option82 rebuild" is enabled on an interface, allow remote attackers to cause a denial of service (reboot) via crafted DHCP packets. | 7.1 |