Vulnerabilities > Cisco > Catalyst 3560

DATE CVE VULNERABILITY TITLE RISK
2019-09-25 CVE-2019-12669 Improper Input Validation vulnerability in Cisco IOS 15.2(3)E/15.2(3)E5/16.11.1
A vulnerability in the RADIUS Change of Authorization (CoA) code of Cisco TrustSec, a feature within Cisco IOS XE Software, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
network
low complexity
cisco CWE-20
7.8
2013-02-13 CVE-2013-1100 Resource Management Errors vulnerability in Cisco IOS
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
network
high complexity
cisco CWE-399
5.4
2012-08-06 CVE-2012-1338 Race Condition vulnerability in Cisco products
Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.
network
cisco CWE-362
6.3
2005-12-15 CVE-2005-4258 Cisco Catalyst Switches LanD Packet Denial Of Service vulnerability in Multiple
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD).
network
low complexity
cisco
7.8