Filtered by vendor Pingtel
Subscriptions
Filtered by product Xpressa
Subscriptions
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2004-1680 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
application.cgi in the Pingtel Xpressa handset running firmware 2.1.11.24 allows remote authenticated users to cause a denial of service (VxWorks OS crash) via a long HTTP GET request, possibly triggering a buffer overflow. | ||||
CVE-2002-1935 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
Pingtel Xpressa 1.2.5 through 2.0.1 uses predictable (1) Call-ID, (2) CSeq, and (3) "To" and "From" SIP URL values in a Session Identification Protocol (SIP) request, which allows remote attackers to avoid registering with the SIP registrar. | ||||
CVE-2002-1934 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 2.0.1 leaks sensitive information during boot-up, which allows attackers to obtain the MD5 hash of the Admin password, MD5 hash of the physical password, and other registration information. | ||||
CVE-2002-0675 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 does not require administrative privileges to perform a firmware upgrade, which allows unauthorized users to upgrade the phone. | ||||
CVE-2002-0674 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 does not "time out" an inactive administrator session, which could allow other users to perform administrator actions if the administrator does not explicitly end the authentication. | ||||
CVE-2002-0673 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
The enrollment process for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows attackers with physical access to the phone to log out the current user and re-register the phone using MyPingtel Sign-In to gain remote access and perform unauthorized actions. | ||||
CVE-2002-0672 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows attackers with physical access to restore the phone to factory defaults without authentication via a menu option, which sets the administrator password to null. | ||||
CVE-2002-0671 | 1 Pingtel | 2 Xpressa, Xpressa Firmware | 2024-11-21 | 9.8 Critical |
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 downloads phone applications from a web site but can not verify the integrity of the applications, which could allow remote attackers to install Trojan horse applications via DNS spoofing. | ||||
CVE-2002-0670 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 uses Base64 encoded usernames and passwords for HTTP basic authentication, which allows remote attackers to steal and easily decode the passwords via sniffing. | ||||
CVE-2002-0669 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows administrators to cause a denial of service by modifying the SIP_AUTHENTICATE_SCHEME value to force authentication of incoming calls, which does not notify the user when an authentication failure occurs. | ||||
CVE-2002-0668 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows authenticated users to modify the Call Forwarding settings and hijack calls. | ||||
CVE-2002-0667 | 1 Pingtel | 1 Xpressa | 2024-11-21 | N/A |
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 has a default null administrator password, which could allow remote attackers to gain access to the phone. |
Page 1 of 1.