Known vulnerabilities in Cisco Systems, Inc Cisco Prime Collaboration Provisioning 12.1

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Cisco Systems, Inc › Cisco Prime Collaboration Provisioning › 12.1

Known vulnerabilities in Cisco Systems, Inc Cisco Prime Collaboration Provisioning 12.1

Vendor: Cisco Systems, Inc
Website: https://www.cisco.com
Total Security Bulletins: 8
12.6 SU3 12.6 12.6 SU2 - 12.6 SU1 12.3 12.2 11.6 11.5(0) 12.1 11.0(0.621) 11.0(0.645) 11.0(0.641) 11.0(0.638) 11.0(0.619) 10.6 10.6 SP2

Security bulletins (8)

Secuity bulletin Severity Status Published
SB2018080205: Denial of service in Cisco Prime Collaboration Provisioning Low
Patched
02.08.2018
SB2018060703: Multiple vulnerabilities in Cisco Prime Collaboration Provisioning Low
Patched
07.06.2018
SB2018030910: Privilege escalation in Cisco Prime Collaboration Provisioning Low
Patched
09.03.2018
SB2018022211: Multiple vulnerabilities in Cisco Prime Collaboration Provisioning Low
Patched
22.02.2018
SB2017110208: SQL injection in Cisco Prime Collaboration Provisioning Low
Patched
02.11.2017
SB2017090705: Two vulnerabilities in Cisco Prime Collaboration Provisioning Low
Patched
07.09.2017
SB2017080304: Two vulnerabilities in Cisco Prime Collaboration Provisioning Medium
Patched
03.08.2017
SB2017062206: Multiple vulnerabilities in Cisco Prime Collaboration Provisioning Low
Patched
22.06.2017

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or