Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 23 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sipp
Sipp sipp |
|
| Vendors & Products |
Sipp
Sipp sipp |
Fri, 23 Jan 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in SIPp. A remote attacker could exploit this by sending specially crafted Session Initiation Protocol (SIP) messages during an active call. This vulnerability, a NULL pointer dereference, can cause the application to crash, leading to a denial of service. Under specific conditions, it may also allow an attacker to execute unauthorized code, compromising the system's integrity and availability. | |
| Title | Sipp/sipp: sipp: denial of service and potential arbitrary code execution vulnerability | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2026-01-23T19:04:04.032Z
Reserved: 2026-01-08T06:21:31.656Z
Link: CVE-2026-0710
Updated: 2026-01-23T19:03:59.456Z
Status : Deferred
Published: 2026-01-23T04:16:01.860
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-0710
No data.
OpenCVE Enrichment
Updated: 2026-04-18T03:15:35Z