Product:

Catalyst_6000_ws\-Svc\-Nam\-1

(Cisco)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2007-03-03 CVE-2007-1257 The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address. Catalyst_6000_ws\-Svc\-Nam\-1, Catalyst_6000_ws\-Svc\-Nam\-2, Catalyst_6000_ws\-X6380\-Nam, Catalyst_6500_ws\-Svc\-Nam\-1, Catalyst_6500_ws\-Svc\-Nam\-2, Catalyst_6500_ws\-X6380\-Nam, Catalyst_7600_ws\-Svc\-Nam\-1, Catalyst_7600_ws\-Svc\-Nam\-2, Catalyst_7600_ws\-X6380\-Nam, Network_analysis_module N/A
2005-12-15 CVE-2005-4258 Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. Catalyst, Catalyst_1200_series, Catalyst_1900_series, Catalyst_2800_series, Catalyst_2820, Catalyst_2900, Catalyst_2901, Catalyst_2902, Catalyst_2920, Catalyst_2926, Catalyst_2926f, Catalyst_2926gl, Catalyst_2926gs, Catalyst_2926t, Catalyst_2940, Catalyst_2948, Catalyst_2948\-Ge\-Tx, Catalyst_2948g\-L3, Catalyst_2950, Catalyst_2950_lre, Catalyst_2955, Catalyst_2970, Catalyst_2980g, Catalyst_2980g\-A, Catalyst_3000, Catalyst_3200, Catalyst_3500_xl, Catalyst_3550, Catalyst_3560, Catalyst_3750, Catalyst_3750_metro, Catalyst_3900, Catalyst_4000, Catalyst_4200, Catalyst_4224, Catalyst_4232, Catalyst_4232\-13, Catalyst_4500, Catalyst_4503, Catalyst_4506, Catalyst_4507r, Catalyst_4510r, Catalyst_4840g, Catalyst_4908g\-L3, Catalyst_4912g, Catalyst_4948, Catalyst_5000, Catalyst_5505, Catalyst_5509, Catalyst_6000, Catalyst_6000_ws\-Svc\-Nam\-1, Catalyst_6000_ws\-Svc\-Nam\-2, Catalyst_6000_ws\-X6380\-Nam, Catalyst_6500, Catalyst_6500_ws\-Svc\-Nam\-1, Catalyst_6500_ws\-Svc\-Nam\-2, Catalyst_6500_ws\-X6380\-Nam, Catalyst_6608, Catalyst_6624, Catalyst_7600, Catalyst_7600_ws\-Svc\-Nam\-1, Catalyst_7600_ws\-Svc\-Nam\-2, Catalyst_7600_ws\-X6380\-Nam, Catalyst_8500, Catalyst_8510csr, Catalyst_8510msr, Catalyst_8540csr, Catalyst_8540msr, Catalyst_ws\-C2924\-Xl, Catos, Ios N/A
2004-08-06 CVE-2004-0551 Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack." Catalyst_2901, Catalyst_2902, Catalyst_2926, Catalyst_2926f, Catalyst_2926gl, Catalyst_2926gs, Catalyst_2926t, Catalyst_2948, Catalyst_2948\-Ge\-Tx, Catalyst_2948g\-L3, Catalyst_2980g, Catalyst_2980g\-A, Catalyst_4000, Catalyst_4500, Catalyst_4503, Catalyst_4506, Catalyst_4507r, Catalyst_4510r, Catalyst_4912g, Catalyst_5000, Catalyst_6000_ws\-Svc\-Nam\-1, Catalyst_6000_ws\-Svc\-Nam\-2, Catalyst_6000_ws\-X6380\-Nam, Catos N/A