CVE-2013-1100
https://notcve.org/view.php?id=CVE-2013-1100
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853. El servidor HTTP en Cisco IOS en switches Catalyst no trata correctamente los eventos socket TCP, lo que permite a atacantes remotos provocar una denegación de servicio (caída de dispositivo) a través de paquetes hechos a mano en el puerto TCP (1) 80 o (2) 443, también conocido como Bug ID CSCuc53853. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100 • CWE-399: Resource Management Errors •
CVE-2007-5134
https://notcve.org/view.php?id=CVE-2007-5134
Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended. Las series de dispositivos Cisco Catalyst 6500 y Cisco 7600 utilizan direcciones IP 127/8 para el Canal Ethernet Fuera de Banda (EOBC, Ethernet Out-of-Band Channel), lo cual permite a atacantes remotos enviar paquetes a una interfaz para la cual la exposición de la red no era intencionada. • http://seclists.org/fulldisclosure/2007/Sep/0573.html http://secunia.com/advisories/26988 http://securitytracker.com/id?1018742 http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml http://www.securityfocus.com/bid/25822 http://www.securitytracker.com/id?1018743 http://www.vupen.com/english/advisories/2007/3276 https://exchange.xforce.ibmcloud.com/vulnerabilities/36826 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2007-1257
https://notcve.org/view.php?id=CVE-2007-1257
The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address. El Módulo Network Analysis (NAM) del Cisco Catalyst Series 6000, 6500 y 7600 permite a atacantes remotos ejecutar comandos de su elección mediante ciertos paquetes SNMP que son simulados desde la propia dirección IP del NAM. • http://osvdb.org/33066 http://secunia.com/advisories/24344 http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml http://www.kb.cert.org/vuls/id/472412 http://www.securityfocus.com/bid/22751 http://www.securitytracker.com/id?1017710 http://www.vupen.com/english/advisories/2007/0783 https://exchange.xforce.ibmcloud.com/vulnerabilities/32750 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188 • CWE-20: Improper Input Validation •
CVE-2005-4258
https://notcve.org/view.php?id=CVE-2005-4258
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. Conmutadores Cisco Catalyst no especificados permiten a atacantes remotos causar una denegación de servicio (caída de dispositivo) mediante un paquete IP con IPs y puertos de origen y destino iguales y con la bandera SYN. (tcc LanD). NOTA: La proveniencia de esta cuestión es desconocida; los detalles son obtenidos exclusivamente de BID. • http://www.securityfocus.com/bid/15864 https://exchange.xforce.ibmcloud.com/vulnerabilities/44543 •
CVE-2003-1001
https://notcve.org/view.php?id=CVE-2003-1001
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication. Desbordamiento de búfer en el Módulo de Servicios de Cortafuegos Cisco (FWSM) en dispositivos de la seria Cisco Cayalyst 6500 y 7600 permiten a atacantes remotos causar una denegación de servicio (caída y recarga) mediante una petición HTTP auth para autenticación TACACS+ o RADIUS. • http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml •