Cisco Catalyst 3560-E

CPE Details

Cisco Catalyst 3560-E
-
2012-08-07
16h59 +00:00
2012-08-10
15h06 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:cisco:catalyst_3560-e:-:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

catalyst_3560-e

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2019-12669 2019-09-25 20h15 +00:00 A vulnerability in the RADIUS Change of Authorization (CoA) code of Cisco TrustSec, a feature within Cisco IOS XE Software, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of a malformed packet. An attacker could exploit this vulnerability by sending a malformed packet to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.
7.5
Haute
CVE-2013-1100 2013-02-13 23h00 +00:00 The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
5.4
CVE-2012-1338 2012-08-06 15h00 +00:00 Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.
6.3