Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j4f8-qfhr-gjf7

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Pingtel Xpressa 1.2.5 through 2.0.1 uses predictable (1) Call-ID, (2) CSeq, and (3) "To" and "From" SIP URL values in a Session Identification Protocol (SIP) request, which allows remote attackers to avoid registering with the SIP registrar.

Pingtel Xpressa 1.2.5 through 2.0.1 uses predictable (1) Call-ID, (2) CSeq, and (3) "To" and "From" SIP URL values in a Session Identification Protocol (SIP) request, which allows remote attackers to avoid registering with the SIP registrar.

EPSS

Процентиль: 70%
0.00627
Низкий

Связанные уязвимости

nvd
около 23 лет назад

Pingtel Xpressa 1.2.5 through 2.0.1 uses predictable (1) Call-ID, (2) CSeq, and (3) "To" and "From" SIP URL values in a Session Identification Protocol (SIP) request, which allows remote attackers to avoid registering with the SIP registrar.

EPSS

Процентиль: 70%
0.00627
Низкий