296,720
Total vulnerabilities in the database
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
Software | From | Fixed in |
---|---|---|
pexip / pexip_infinity | - | 7.0.x |