Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pexip pexip infinity vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-31455
Pexip Infinity prior to 31.2 has Improper Input Validation for RTCP, allowing remote malicious users to trigger an abort.
Pexip Pexip Infinity
NA
CVE-2023-37225
Pexip Infinity prior to 32 allows Webapp1 XSS via preconfigured links.
Pexip Pexip Infinity
NA
CVE-2023-31289
Pexip Infinity prior to 31.2 has Improper Input Validation for signalling, allowing remote malicious users to trigger an abort.
Pexip Pexip Infinity
5
CVSSv2
CVE-2022-29286
Pexip Infinity 27 prior to 28.0 allows remote malicious users to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Pexip Infinity
NA
CVE-2022-32263
Pexip Infinity prior to 28.1 allows remote malicious users to trigger a software abort via G.719.
Pexip Pexip Infinity
5
CVSSv2
CVE-2022-25357
Pexip Infinity 27.x prior to 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Pexip Infinity
5
CVSSv2
CVE-2022-26654
Pexip Infinity prior to 27.3 allows remote malicious users to force a software abort via HTTP.
Pexip Pexip Infinity
5
CVSSv2
CVE-2022-26655
Pexip Infinity 27.x prior to 27.3 has Improper Input Validation. The client API allows remote malicious users to trigger a software abort via a gateway call into Teams.
Pexip Pexip Infinity
5
CVSSv2
CVE-2022-26657
Pexip Infinity prior to 27.3 allows remote malicious users to trigger a software abort via One Touch Join.
Pexip Pexip Infinity
5
CVSSv2
CVE-2022-27929
Pexip Infinity 27.x prior to 27.3 allows remote malicious users to trigger a software abort via HTTP.
Pexip Pexip Infinity
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »