Vulnerabilities > Cisco > Catalyst 3560
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-09-25 | CVE-2019-12669 | Improper Input Validation vulnerability in Cisco IOS 15.2(3)E/15.2(3)E5/16.11.1 A vulnerability in the RADIUS Change of Authorization (CoA) code of Cisco TrustSec, a feature within Cisco IOS XE Software, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. | 7.8 |
2013-02-13 | CVE-2013-1100 | Resource Management Errors vulnerability in Cisco IOS The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853. | 5.4 |
2012-08-06 | CVE-2012-1338 | Race Condition vulnerability in Cisco products Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664. | 6.3 |
2005-12-15 | CVE-2005-4258 | Cisco Catalyst Switches LanD Packet Denial Of Service vulnerability in Multiple Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). | 7.8 |