As long as you have total control over all directly connected units and at least configured your switch correctly for all the connected interfaces, there should not be any problems with this.
The only feasible way to attack a 'pure' switch is by manipulating the frames sent from a host to attain a higher level of trust in a badly configured switch.
Of course if you are totally paranoid the most secure is of course to separate the DMZ's (including outside towards the internet) in separate switches... I know many does this also because of ease... Many uses a hub in front to allow for easy sniffing/checking of the internet-traffic.. the 6509 has support for monitor-sessions (but only a very limited number) but it's sometimes a hassle to do the right allocations (especially if you have a large network and many supporting engineers working)..
All in all I would say, it's safe in principle, but take care to configure your switch and supporting layer3 units correctly to avoid security-breaches.. :)
Did it help?