Product:

Catalyst_7600

(Cisco)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 14
Date Id Summary Products Score Patch Annotated
2007-09-27 CVE-2007-5134 Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended. Catalyst_6500, Catalyst_6500_ws\-Svc\-Nam\-1, Catalyst_6500_ws\-Svc\-Nam\-2, Catalyst_6500_ws\-X6380\-Nam, Catalyst_7600, Catalyst_7600_ws\-Svc\-Nam\-1, Catalyst_7600_ws\-Svc\-Nam\-2, Catalyst_7600_ws\-X6380\-Nam, Catos N/A
2007-03-03 CVE-2007-1258 Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet. Catalyst_6000, Catalyst_6500, Catalyst_7600, Ios N/A
2005-12-15 CVE-2005-4258 Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. Catalyst, Catalyst_1200_series, Catalyst_1900_series, Catalyst_2800_series, Catalyst_2820, Catalyst_2900, Catalyst_2901, Catalyst_2902, Catalyst_2920, Catalyst_2926, Catalyst_2926f, Catalyst_2926gl, Catalyst_2926gs, Catalyst_2926t, Catalyst_2940, Catalyst_2948, Catalyst_2948\-Ge\-Tx, Catalyst_2948g\-L3, Catalyst_2950, Catalyst_2950_lre, Catalyst_2955, Catalyst_2970, Catalyst_2980g, Catalyst_2980g\-A, Catalyst_3000, Catalyst_3200, Catalyst_3500_xl, Catalyst_3550, Catalyst_3560, Catalyst_3750, Catalyst_3750_metro, Catalyst_3900, Catalyst_4000, Catalyst_4200, Catalyst_4224, Catalyst_4232, Catalyst_4232\-13, Catalyst_4500, Catalyst_4503, Catalyst_4506, Catalyst_4507r, Catalyst_4510r, Catalyst_4840g, Catalyst_4908g\-L3, Catalyst_4912g, Catalyst_4948, Catalyst_5000, Catalyst_5505, Catalyst_5509, Catalyst_6000, Catalyst_6000_ws\-Svc\-Nam\-1, Catalyst_6000_ws\-Svc\-Nam\-2, Catalyst_6000_ws\-X6380\-Nam, Catalyst_6500, Catalyst_6500_ws\-Svc\-Nam\-1, Catalyst_6500_ws\-Svc\-Nam\-2, Catalyst_6500_ws\-X6380\-Nam, Catalyst_6608, Catalyst_6624, Catalyst_7600, Catalyst_7600_ws\-Svc\-Nam\-1, Catalyst_7600_ws\-Svc\-Nam\-2, Catalyst_7600_ws\-X6380\-Nam, Catalyst_8500, Catalyst_8510csr, Catalyst_8510msr, Catalyst_8540csr, Catalyst_8540msr, Catalyst_ws\-C2924\-Xl, Catos, Ios N/A
2005-01-10 CVE-2004-1111 Cisco IOS 2.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW, and other versions without the "no service dhcp" command, keep undeliverable DHCP packets in the queue instead of dropping them, which allows remote attackers to cause a denial of service (dropped traffic) via multiple undeliverable DHCP packets that exceed the input queue size. 7200_router, 7300_router, 7500_router, 7600_router, Catalyst_7600, Ios, Multiservice_platform_2650, Multiservice_platform_2650xm, Multiservice_platform_2651, Multiservice_platform_2651xm N/A