Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco catalyst 6000 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-20276
A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent malicious user to cause an affected device to reload unexpectedly. This vulnerability is due to improper handling of process-switched traffic. An attacker could ...
NA
CVE-2015-0771
The IKE implementation in the WS-IPSEC-3 service module in Cisco IOS 12.2 on Catalyst 6500 devices allows remote authenticated users to cause a denial of service (device reload) by sending a crafted message during IPsec tunnel setup, aka Bug ID CSCur70505.
Cisco Ios 12.2\\(33\\)sxj8
Cisco Ios 12.2sxj
NA
CVE-2007-1258
Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) ...
Cisco Catalyst 6000
Cisco Catalyst 7600
Cisco Catalyst 6500
Cisco Catalyst 6500
Cisco Ios 12.2sxb
Cisco Ios 12.2sxa
Cisco Ios 12.2sxd
Cisco Ios 12.2sxf
Cisco Ios 12.2\\(18\\)sxf4
NA
CVE-2007-1257
The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote malicious users to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address.
Cisco Network Analysis Module
Cisco Catalyst 6500 Ws-svc-nam-2 2.2\\(1a\\)
Cisco Catalyst 6500 Ws-x6380-nam 3.1\\(1a\\)
Cisco Catalyst 6000 Ws-svc-nam-1 2.2\\(1a\\)
Cisco Catalyst 6000 Ws-svc-nam-2 2.2\\(1a\\)
Cisco Catalyst 7600 Ws-x6380-nam 3.1\\(1a\\)
Cisco Catalyst 7600 Ws-svc-nam-1 2.2\\(1a\\)
Cisco Catalyst 7600 Ws-svc-nam-2 2.2\\(1a\\)
Cisco Catalyst 6000 Ws-x6380-nam 3.1\\(1a\\)
Cisco Catalyst 6500 Ws-svc-nam-1 2.2\\(1a\\)
NA
CVE-2005-4258
Unspecified Cisco Catalyst Switches allow remote malicious users to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are o...
Cisco Catalyst 2800 Series
Cisco Catalyst 2820
Cisco Catalyst 2920
Cisco Catalyst 2926
Cisco Catalyst 2926f
Cisco Catalyst 2948g-l3
Cisco Catalyst 2950
Cisco Catalyst 3200
Cisco Catalyst 3500 Xl
Cisco Catalyst 4000
Cisco Catalyst 4500
Cisco Catalyst 4503
Cisco Catalyst 4948
Cisco Catalyst 5000
Cisco Catalyst 6000 Ws-svc-nam-2 2.2\\(1a\\)
Cisco Catalyst 6000 Ws-svc-nam-2 3.1\\(1a\\)
Cisco Catalyst 6500 Ws-svc-nam-2 3.1\\(1a\\)
Cisco Catalyst 6500 Ws-x6380-nam 2.1\\(2\\)
Cisco Catalyst Sup3
Cisco Catalyst 1200 Series
Cisco Catalyst 2900 Lre Xl
Cisco Catalyst 2900 Xl
NA
CVE-2004-1111
Cisco IOS 2.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW, and other versions without the "no service dhcp" command, keep undeliverable DHCP packets in the queue instead of dropping them, which allows remote malicious users to cause a d...
Cisco Ios 12.2\\(18\\)ew
Cisco Ios 12.2\\(18\\)ewa
Cisco Ios 12.2\\(18\\)s
Cisco Ios 12.2\\(18\\)se
Cisco Ios 12.2\\(14\\)sz
Cisco Ios 12.2\\(20\\)ew
Cisco Ios 12.2\\(18\\)sv
Cisco Ios 12.2\\(18\\)sw
Cisco Multiservice Platform 2650
Cisco Multiservice Platform 2650xm
Cisco Multiservice Platform 2651
Cisco Multiservice Platform 2651xm
Cisco Catalyst 7600
Cisco 7500 Router
Cisco 7600 Router
Cisco 7200 Router
Cisco 7300 Router
NA
CVE-2004-0081
OpenSSL 0.9.6 prior to 0.9.6d does not properly handle unknown message types, which allows remote malicious users to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1 \\(3.005\\)
Cisco Firewall Services Module
Cisco Firewall Services Module 1.1.2
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Hp Aaa Server
Cisco Ciscoworks Common Management Foundation 2.1
Cisco Ciscoworks Common Services 2.2
Avaya Sg208 4.4
Avaya Sg5 4.2
Avaya Sg5 4.3
Freebsd Freebsd 5.1
Hp Hp-ux 8.05
Openbsd Openbsd 3.3
Redhat Linux 8.0
Sco Openserver 5.0.6
Avaya Sg203 4.4
Avaya Sg208
Freebsd Freebsd 4.8
NA
CVE-2004-0112
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshak...
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 \\(3.005\\)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
NA
CVE-2004-0230
TCP, when using a large Window Size, makes it easier for remote malicious users to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connection...
Oracle Solaris 11
Oracle Solaris 10
Openpgp Openpgp 2.6.2
Mcafee Network Data Loss Prevention 9.2.1
Mcafee Network Data Loss Prevention 9.2.0
Mcafee Network Data Loss Prevention
Mcafee Network Data Loss Prevention 9.2.2
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.1
Netbsd Netbsd 1.6.2
Netbsd Netbsd 2.0
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Xinuos Openserver 5.0.6
Xinuos Openserver 5.0.7
Juniper Junos
Xinuos Unixware 7.1.1
Xinuos Unixware 7.1.3
7 EDB exploits
2 Github repositories
NA
CVE-2004-0551
Cisco CatOS 5.x prior to 5.5(20) up to and including 8.x prior to 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote malicious users to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way ...
Cisco Catos 2.1\\(1\\)
Cisco Catos 2.1\\(10\\)
Cisco Catos 2.1\\(7\\)
Cisco Catos 2.1\\(8\\)
Cisco Catos 2.4\\(3\\)
Cisco Catos 2.4\\(4\\)
Cisco Catos 3.2\\(1\\)
Cisco Catos 3.2\\(1b\\)
Cisco Catos 3.2\\(2\\)
Cisco Catos 4.1\\(1\\)
Cisco Catos 4.1\\(2\\)
Cisco Catos 4.5\\(10\\)
Cisco Catos 4.5\\(11\\)
Cisco Catos 4.5\\(4\\)
Cisco Catos 4.5\\(5\\)
Cisco Catos 5.1\\(1\\)csx
Cisco Catos 5.1\\(1a\\)
Cisco Catos 5.2\\(2\\)csx
Cisco Catos 5.2\\(3\\)
Cisco Catos 5.3\\(1a\\)csx
Cisco Catos 5.3\\(2\\)csx
Cisco Catos 5.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »