Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
infinity vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2022-27936
Pexip Infinity prior to 27.3 allows remote malicious users to trigger a software abort via H.323.
Pexip Pexip Infinity
7.5
CVSSv3
CVE-2022-27937
Pexip Infinity prior to 27.3 allows remote malicious users to trigger excessive resource consumption via H.264.
Pexip Pexip Infinity
6.1
CVSSv3
CVE-2023-37225
Pexip Infinity prior to 32 allows Webapp1 XSS via preconfigured links.
Pexip Pexip Infinity
7.2
CVSSv3
CVE-2019-7178
Pexip Infinity prior to 20.1 allows privilege escalation by restoring a system backup.
Pexip Pexip Infinity
5.3
CVSSv3
CVE-2020-24615
Pexip Infinity prior to 24.1 has Improper Input Validation, leading to temporary denial of service via SIP.
Pexip Pexip Infinity
7.5
CVSSv3
CVE-2020-12824
Pexip Infinity 23.x prior to 23.3 has improper input validation, leading to a temporary software abort via RTP.
Pexip Pexip Infinity
NA
CVE-2014-8779
Pexip Infinity prior to 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle malicious users to spoof Management and Conferencing Nodes by leveraging these keys.
Pexip Pexip Infinity
5.3
CVSSv3
CVE-2022-25357
Pexip Infinity 27.x prior to 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Pexip Infinity
9.8
CVSSv3
CVE-2021-29655
Pexip Infinity Connect prior to 1.8.0 omits certain provisioning authenticity checks. Thus, untrusted code may execute.
Pexip Infinity Connect
9.8
CVSSv3
CVE-2021-29656
Pexip Infinity Connect prior to 1.8.0 mishandles TLS certificate validation. The allow list is not properly checked.
Pexip Infinity Connect
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »