Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pjsip pjsip vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2014-4048
The PJSIP Channel Driver in Asterisk Open Source prior to 12.3.1 allows remote malicious users to cause a denial of service (deadlock) by terminating a subscription request before it is complete, which triggers a SIP transaction timeout.
Digium Asterisk 12.0.0
Digium Asterisk 12.3.0
Digium Asterisk 12.1.0
Digium Asterisk 12.1.1
Digium Asterisk 12.2.0
Digium Asterisk
383
VMScore
CVE-2014-4045
The Publish/Subscribe Framework in the PJSIP channel driver in Asterisk Open Source 12.x prior to 12.3.1, when sub_min_expiry is set to zero, allows remote malicious users to cause a denial of service (assertion failure and crash) via an unsubscribe request when not subscribed to...
Digium Asterisk 12.0.0
Digium Asterisk 12.3.0
Digium Asterisk 12.1.0
Digium Asterisk 12.1.1
Digium Asterisk 12.2.0
383
VMScore
CVE-2014-2288
The PJSIP channel driver in Asterisk Open Source 12.x prior to 12.1.1, when qualify_frequency "is enabled on an AOR and the remote SIP server challenges for authentication of the resulting OPTIONS request," allows remote malicious users to cause a denial of service (cra...
Digium Asterisk 12.0.0
Digium Asterisk 12.1.0
356
VMScore
CVE-2022-29330
Missing access control in the backup system of Telesoft VitalPBX prior to 3.2.1 allows malicious users to access the PJSIP and SIP extension credentials, cryptographic keys and voicemails files via unspecified vectors.
Vitalpbx Vitalpbx
356
VMScore
CVE-2021-31878
An issue exists in PJSIP in Asterisk prior to 16.19.1 and prior to 18.5.1. To exploit, a re-INVITE without SDP must be received after Asterisk has sent a BYE request.
Digium Asterisk 18.3.0
Digium Asterisk 18.4.0
Digium Asterisk 16.17.0
Digium Asterisk 16.18.0
Digium Asterisk 16.19.0
Digium Asterisk 18.5.0
312
VMScore
CVE-2015-1558
Asterisk Open Source 12.x prior to 12.8.1 and 13.x prior to 13.1.1, when using the PJSIP channel driver, does not properly reclaim RTP ports, which allows remote authenticated users to cause a denial of service (file descriptor consumption) via an SDP offer containing only incomp...
Digium Asterisk 13.1.0
Digium Asterisk 12.0.0
Digium Asterisk 12.3.1
Digium Asterisk 12.3.0
Digium Asterisk 12.1.0
Digium Asterisk 12.7.0
Digium Asterisk 13.2.0
Digium Asterisk 12.4.0
Digium Asterisk 12.1.1
Digium Asterisk 12.2.0
Digium Asterisk 12.8.0
Digium Asterisk 12.5.0
Digium Asterisk 13.0.0
Digium Asterisk 12.8.1
Digium Asterisk 12.3.2
Digium Asterisk 12.6.0
312
VMScore
CVE-2014-2289
res/res_pjsip_exten_state.c in the PJSIP channel driver in Asterisk Open Source 12.x prior to 12.1.0 allows remote authenticated users to cause a denial of service (crash) via a SUBSCRIBE request without any Accept headers, which triggers an invalid pointer dereference.
Digium Asterisk 12.0.0
Digium Asterisk 12.1.0
NA
CVE-2024-35190
Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.
NA
CVE-2023-38703
PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level tr...
Teluu Pjsip
NA
CVE-2023-27585
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability...
Teluu Pjsip
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »