Vulnerabilities > Cisco > Catalyst 6500 WS SVC NAM 2 > 3.1.1a

DATE CVE VULNERABILITY TITLE RISK
2013-02-13 CVE-2013-1100 Resource Management Errors vulnerability in Cisco IOS
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
network
high complexity
cisco CWE-399
5.4
2007-09-27 CVE-2007-5134 Permissions, Privileges, and Access Controls vulnerability in Cisco products
Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.
network
low complexity
cisco CWE-264
5.0
2005-12-15 CVE-2005-4258 Cisco Catalyst Switches LanD Packet Denial Of Service vulnerability in Multiple
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD).
network
low complexity
cisco
7.8
2004-01-05 CVE-2003-1002 Denial-Of-Service vulnerability in Catalyst 7600
Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.
network
low complexity
cisco
5.0
2004-01-05 CVE-2003-1001 Denial-Of-Service vulnerability in Catalyst 7600
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.
network
low complexity
cisco
5.0