Known vulnerabilities in Cisco Systems, Inc Catalyst 8500L Series Edge Platforms

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Cisco Systems, Inc › Catalyst 8500L Series Edge Platforms

Known vulnerabilities in Cisco Systems, Inc Catalyst 8500L Series Edge Platforms

Vendor: Cisco Systems, Inc
Website: https://www.cisco.com
Total Security Bulletins: 11

Security bulletins (11)

Secuity bulletin Severity Status Published
SB2024092666: Heap-based buffer overflow in Cisco Unified Threat Defense Snort Intrusion Prevention System Engine for Cisco IOS XE Software Medium
Patched
26.09.2024
SB2024092653: Denial of service in Cisco Catalyst SD-WAN Routers High
Patched
26.09.2024
SB2024052726: Authentication Bypass by Spoofing in Cisco Products Medium
Patched
27.05.2024
SB2023110326: Access Control Policy Bypass in multiple Cisco Products Medium
Patched
03.11.2023
SB2023110325: Security features bypass in multiple Cisco Products Medium
Patched
03.11.2023
SB2023092936: Denial of service in Cisco IOS XE Software High
Patched
29.09.2023
SB2023092819: Denial of service in Cisco IOS XE software Layer 2 tunneling protocol Medium
Patched
28.09.2023
SB2023032344: Denial of service in Cisco IOS XE Software High
Patched
23.03.2023
SB2023020156: OS command injection in Cisco IOx Application Hosting Environment Low
Patched
01.02.2023
SB2022041408: Denial of service in Cisco IOS XE Software Resource Public Key Infrastructure Medium
Patched
14.04.2022
SB2021042922: Security features bypass in Multiple Cisco Products Medium
Patched
29.04.2021


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or