Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

pjsip — Vulnerabilities & Security Advisories 38

Browse all 38 CVE security advisories affecting pjsip. AI-powered Chinese analysis, POCs, and references for each vulnerability.

PJSIP is an open-source multimedia communication library primarily utilized for developing Voice over IP (VoIP) applications, including softphones and SIP servers. Its widespread adoption in embedded systems and enterprise telephony solutions has resulted in a significant attack surface, evidenced by thirty-seven recorded Common Vulnerabilities and Exposures. Historically, the codebase has been susceptible to critical flaws such as remote code execution, buffer overflows, and denial-of-service conditions, often stemming from inadequate input validation and memory management errors. While not inherently insecure, its complexity and frequent updates have led to periodic security incidents where attackers exploited parsing vulnerabilities to gain unauthorized access or disrupt services. Developers are advised to prioritize regular patching and rigorous code auditing to mitigate these risks, ensuring the integrity of communication infrastructure that relies on this foundational library for real-time audio and video transmission.

Top products by pjsip: pjproject pjmedia-video

This page lists every published CVE security advisory associated with pjsip. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.