Vulnerabilities > Cisco > Catalyst 6000 WS SVC NAM 2 > 2.2.1a

DATE CVE VULNERABILITY TITLE RISK
2013-02-13 CVE-2013-1100 Resource Management Errors vulnerability in Cisco IOS
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
network
high complexity
cisco CWE-399
5.4
2007-03-03 CVE-2007-1257 Improper Input Validation vulnerability in Cisco products
The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address.
network
low complexity
cisco CWE-20
critical
10.0
2005-12-15 CVE-2005-4258 Cisco Catalyst Switches LanD Packet Denial Of Service vulnerability in Multiple
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD).
network
low complexity
cisco
7.8
2004-08-06 CVE-2004-0551 Denial-Of-Service vulnerability in Cisco Catalyst 4500
Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."
network
low complexity
cisco
5.0