Product:

Pexip_infinity

(Pexip)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 31
Date Id Summary Products Score Patch Annotated
2024-06-10 CVE-2024-33850 Pexip Infinity before 34.1 has Improper Access Control for persons in a waiting room. They can see the conference roster list, and perform certain actions that should not be allowed before they are admitted to the meeting. Pexip_infinity N/A
2025-04-02 CVE-2024-37917 Pexip Infinity before 35.0 has improper input validation that allows remote attackers to trigger a denial of service (software abort) via a crafted signalling message. Pexip_infinity N/A
2025-04-02 CVE-2025-30080 Signalling in Pexip Infinity 29 through 36.2 before 37.0 has improper input validation that allows remote attackers to trigger a temporary denial of service (software abort). Pexip_infinity N/A
2020-09-25 CVE-2020-12824 Pexip Infinity 23.x before 23.3 has improper input validation, leading to a temporary software abort via RTP. Pexip_infinity 7.5
2020-09-25 CVE-2020-13387 Pexip Infinity before 23.4 has a lack of input validation, leading to temporary denial of service via H.323. Pexip_infinity 7.5
2020-09-25 CVE-2020-24615 Pexip Infinity before 24.1 has Improper Input Validation, leading to temporary denial of service via SIP. Pexip_infinity 5.3
2021-07-07 CVE-2020-25868 Pexip Infinity 22.x through 24.x before 24.2 has Improper Input Validation for call setup. An unauthenticated remote attacker can trigger a software abort (temporary loss of service). Pexip_infinity 7.5
2021-07-07 CVE-2021-31925 Pexip Infinity 25.x before 25.4 has Improper Input Validation, and thus an unauthenticated remote attacker can cause a denial of service via the administrative web interface. Pexip_infinity 7.5
2022-02-18 CVE-2022-23228 Pexip Infinity before 27.0 has improper WebRTC input validation. An unauthenticated remote attacker can use excessive resources, temporarily causing denial of service. Pexip_infinity 7.5
2022-07-17 CVE-2022-25357 Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN. Pexip_infinity 5.3