Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
infinity vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2021-29655
Pexip Infinity Connect prior to 1.8.0 omits certain provisioning authenticity checks. Thus, untrusted code may execute.
Pexip Infinity Connect
7.5
CVSSv2
CVE-2021-29656
Pexip Infinity Connect prior to 1.8.0 mishandles TLS certificate validation. The allow list is not properly checked.
Pexip Infinity Connect
5
CVSSv2
CVE-2020-25868
Pexip Infinity 22.x up to and including 24.x prior to 24.2 has Improper Input Validation for call setup. An unauthenticated remote attacker can trigger a software abort (temporary loss of service).
Pexip Pexip Infinity
7.8
CVSSv2
CVE-2018-10432
Pexip Infinity prior to 18 allows Remote Denial of Service (TLS handshakes in RTMP).
Pexip Pexip Infinity
5
CVSSv2
CVE-2022-27928
Pexip Infinity 27.x prior to 27.3 allows remote malicious users to trigger a software abort via the Session Initiation Protocol.
Pexip Pexip Infinity
5
CVSSv2
CVE-2022-27935
Pexip Infinity prior to 27.3 allows remote malicious users to trigger a software abort via Epic Telehealth.
Pexip Pexip Infinity
5
CVSSv2
CVE-2022-27937
Pexip Infinity prior to 27.3 allows remote malicious users to trigger excessive resource consumption via H.264.
Pexip Pexip Infinity
7.8
CVSSv2
CVE-2018-10585
Pexip Infinity prior to 18 allows remote Denial of Service (XML parsing).
Pexip Pexip Infinity
9
CVSSv2
CVE-2019-7178
Pexip Infinity prior to 20.1 allows privilege escalation by restoring a system backup.
Pexip Pexip Infinity
7.5
CVSSv2
CVE-2017-6551
Pexip Infinity prior to 14.2 allows remote malicious users to cause a denial of service (service restart) or execute arbitrary code via vectors related to Conferencing Nodes.
Pexip Pexip Infinity
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »