Total
32 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2015-4719 | 1 Pexip | 1 Pexip Infinity | 2020-10-07 | 7.5 HIGH | 9.8 CRITICAL |
The client API authentication mechanism in Pexip Infinity before 10 allows remote attackers to gain privileges via a crafted request. | |||||
CVE-2018-10432 | 1 Pexip | 1 Pexip Infinity | 2020-10-07 | 7.8 HIGH | 7.5 HIGH |
Pexip Infinity before 18 allows Remote Denial of Service (TLS handshakes in RTMP). | |||||
CVE-2019-7177 | 1 Pexip | 1 Pexip Infinity | 2020-10-01 | 9.0 HIGH | 7.2 HIGH |
Pexip Infinity before 20.1 allows Code Injection onto nodes via an admin. | |||||
CVE-2017-17477 | 1 Pexip | 1 Pexip Infinity | 2020-10-01 | 4.3 MEDIUM | 6.1 MEDIUM |
Pexip Infinity before 17 allows an unauthenticated remote attacker to achieve stored XSS via management web interface views. | |||||
CVE-2018-10585 | 1 Pexip | 1 Pexip Infinity | 2020-10-01 | 7.8 HIGH | 7.5 HIGH |
Pexip Infinity before 18 allows remote Denial of Service (XML parsing). | |||||
CVE-2019-7178 | 1 Pexip | 1 Pexip Infinity | 2020-09-30 | 9.0 HIGH | 7.2 HIGH |
Pexip Infinity before 20.1 allows privilege escalation by restoring a system backup. | |||||
CVE-2020-11805 | 1 Pexip | 2 Pexip Infinity, Reverse Proxy And Turn Server | 2020-09-30 | 9.3 HIGH | 9.8 CRITICAL |
Pexip Reverse Proxy and TURN Server before 6.1.0 has Incorrect UDP Access Control via TURN. | |||||
CVE-2020-12824 | 1 Pexip | 1 Pexip Infinity | 2020-09-30 | 5.0 MEDIUM | 7.5 HIGH |
Pexip Infinity 23.x before 23.3 has improper input validation, leading to a temporary software abort via RTP. | |||||
CVE-2020-13387 | 1 Pexip | 1 Pexip Infinity | 2020-09-30 | 5.0 MEDIUM | 7.5 HIGH |
Pexip Infinity before 23.4 has a lack of input validation, leading to temporary denial of service via H.323. | |||||
CVE-2020-24615 | 1 Pexip | 1 Pexip Infinity | 2020-09-30 | 5.0 MEDIUM | 5.3 MEDIUM |
Pexip Infinity before 24.1 has Improper Input Validation, leading to temporary denial of service via SIP. | |||||
CVE-2014-8779 | 1 Pexip | 1 Pexip Infinity | 2018-10-09 | 7.1 HIGH | N/A |
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys. | |||||
CVE-2017-6551 | 1 Pexip | 1 Pexip Infinity | 2017-05-12 | 7.5 HIGH | 9.8 CRITICAL |
Pexip Infinity before 14.2 allows remote attackers to cause a denial of service (service restart) or execute arbitrary code via vectors related to Conferencing Nodes. |