Cisco » Catalyst 5000 : Security Vulnerabilities, CVEs,
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
Max CVSS
7.8
EPSS Score
0.24%
Published
2005-12-15
Updated
2017-07-20
Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."
Max CVSS
5.0
EPSS Score
0.88%
Published
2004-08-06
Updated
2017-07-11
Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router's interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table.
Max CVSS
5.0
EPSS Score
2.27%
Published
2001-11-15
Updated
2017-10-10
Cisco Catalyst 6000, 5000, or 4000 switches allow remote attackers to cause a denial of service by connecting to the SSH service with a non-SSH client, which generates a protocol mismatch error.
Max CVSS
5.0
EPSS Score
1.98%
Published
2001-02-12
Updated
2017-10-10
4 vulnerabilities found