Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
infinity vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2023-31289
Pexip Infinity prior to 31.2 has Improper Input Validation for signalling, allowing remote malicious users to trigger an abort.
Pexip Pexip Infinity
9.8
CVSSv3
CVE-2021-29655
Pexip Infinity Connect prior to 1.8.0 omits certain provisioning authenticity checks. Thus, untrusted code may execute.
Pexip Infinity Connect
6.1
CVSSv3
CVE-2023-37225
Pexip Infinity prior to 32 allows Webapp1 XSS via preconfigured links.
Pexip Pexip Infinity
7.2
CVSSv3
CVE-2019-7177
Pexip Infinity prior to 20.1 allows Code Injection onto nodes via an admin.
Pexip Pexip Infinity
7.5
CVSSv3
CVE-2022-26654
Pexip Infinity prior to 27.3 allows remote malicious users to force a software abort via HTTP.
Pexip Pexip Infinity
8.2
CVSSv3
CVE-2022-26656
Pexip Infinity prior to 27.3 allows remote malicious users to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Pexip Infinity
7.5
CVSSv3
CVE-2022-26657
Pexip Infinity prior to 27.3 allows remote malicious users to trigger a software abort via One Touch Join.
Pexip Pexip Infinity
7.5
CVSSv3
CVE-2020-25868
Pexip Infinity 22.x up to and including 24.x prior to 24.2 has Improper Input Validation for call setup. An unauthenticated remote attacker can trigger a software abort (temporary loss of service).
Pexip Pexip Infinity
7.5
CVSSv3
CVE-2020-13387
Pexip Infinity prior to 23.4 has a lack of input validation, leading to temporary denial of service via H.323.
Pexip Pexip Infinity
5.3
CVSSv3
CVE-2022-25357
Pexip Infinity 27.x prior to 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Pexip Infinity
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
XXE
CVE-2024-34490
SQL injection
CVE-2024-34488
CVE-2024-4507
CVE-2023-7028
CVE-2024-23187
TCP
CVE-2024-4439
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »