Vulnerabilities > Cisco > Catalyst 6500 WS SVC NAM 2 > 3.1.1a
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2013-02-13 | CVE-2013-1100 | Resource Management Errors vulnerability in Cisco IOS The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853. | 5.4 |
2007-09-27 | CVE-2007-5134 | Permissions, Privileges, and Access Controls vulnerability in Cisco products Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended. | 5.0 |
2005-12-15 | CVE-2005-4258 | Cisco Catalyst Switches LanD Packet Denial Of Service vulnerability in Multiple Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). | 7.8 |
2004-01-05 | CVE-2003-1002 | Denial-Of-Service vulnerability in Catalyst 7600 Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set. | 5.0 |
2004-01-05 | CVE-2003-1001 | Denial-Of-Service vulnerability in Catalyst 7600 Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication. | 5.0 |