Page 17 of 84 results (0.010 seconds)

CVSS: 7.1EPSS: 0%CPEs: 10EXPL: 0

Memory leak in Huawei IPS Module, NGFW Module, NIP6300, NIP6600, and Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 V500R001C00 before V500R001C20SPC100, when in hot standby networking where two devices are not directly connected, allows remote attackers to cause a denial of service (memory consumption and reboot) via a crafted packet. Fuga de memoria en Huawei IPS Module, NGFW Module, NIP6300, NIP6600 y Secospace USG6300, USG6500, USG6600, USG9500 y AntiDDoS8000 V500R001C00 en versiones anteriores a V500R001C20SPC100, cuando en redes de espera activa donde dos dispositivos no están conectados directamente, permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria y reinicio) a través de un paquete manipulado. • http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160615-01-standby-en • CWE-399: Resource Management Errors •

CVSS: 9.8EPSS: 5%CPEs: 18EXPL: 0

Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters." Desbordamiento de buffer en la funcionalidad Application Specific Packet Filtering (ASPF) en dispositivos Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500 y AntiDDoS8000 con software en versiones anteriores a V500R001C20SPC100 permite a atacantes remotos provocar una denegación de servicio o ejecutar código arbitrario a través de un paquete manipulado, relacionado con "illegitimate parameters". • http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en http://www.securityfocus.com/bid/90530 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 10EXPL: 0

Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters." Desbordamiento de buffer en la funcionalidad Smart DNS en los firewalls Huawei NGFW Module y Secospace USG6300, USG6500, USG6600 y USG9500 con software anterior a V500R001C20SPC100 permite a atacantes remotos provocar una denegación de servicio o ejecutar código arbitrario a través de un paquete manipulado, relacionado con "parámetros ilegítimos". • http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en http://www.securityfocus.com/bid/90532 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.5EPSS: 0%CPEs: 107EXPL: 1

The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contraseñas almacenados, lo que hace que sea más fácil para los atacantes dependientes de contexto obtener contraseñas de texto simple a través de un ataque de fuerza bruta. • https://www.exploit-db.com/exploits/38020 http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm http://www.kb.cert.org/vuls/id/948096 • CWE-310: Cryptographic Issues •