Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pingtel xpressa 1.2.8 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2002-1935
Pingtel Xpressa 1.2.5 up to and including 2.0.1 uses predictable (1) Call-ID, (2) CSeq, and (3) "To" and "From" SIP URL values in a Session Identification Protocol (SIP) request, which allows remote malicious users to avoid registering with the SIP registrar.
Pingtel Xpressa 2.0
Pingtel Xpressa 1.2.8
Pingtel Xpressa 1.2.7.4
Pingtel Xpressa 1.2.5
Pingtel Xpressa 2.0.1
445
VMScore
CVE-2002-1934
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 up to and including 2.0.1 leaks sensitive information during boot-up, which allows malicious users to obtain the MD5 hash of the Admin password, MD5 hash of the physical password, and other registration information.
Pingtel Xpressa 2.0
Pingtel Xpressa 1.2.8
Pingtel Xpressa 1.2.7.4
Pingtel Xpressa 1.2.5
Pingtel Xpressa 2.0.1
445
VMScore
CVE-2004-1680
application.cgi in the Pingtel Xpressa handset running firmware 2.1.11.24 allows remote authenticated users to cause a denial of service (VxWorks OS crash) via a long HTTP GET request, possibly triggering a buffer overflow.
Pingtel Xpressa 1.2.5
Pingtel Xpressa 2.0
Pingtel Xpressa 2.0.1
Pingtel Xpressa 2.1.11.24
Pingtel Xpressa 1.2.7.4
Pingtel Xpressa 1.2.8
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started