Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
asterisk asterisk 1.0.8 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-2898
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x prior to 1.2.9 and 1.0.x prior to 1.0.11 allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buff...
Digium Asterisk 1.2.0 Beta1
Digium Asterisk 1.0.9
Digium Asterisk 1.0.10
Digium Asterisk 1.2.8
Digium Asterisk 1.2.6
Digium Asterisk 1.0.8
Digium Asterisk 1.2.7
Digium Asterisk 1.2.0 Beta2
Digium Asterisk 1.0.7
NA
CVE-2007-1594
The handle_response function in chan_sip.c in Asterisk prior to 1.2.17 and 1.4.x prior to 1.4.2 allows remote malicious users to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
Asterisk Asterisk 0.1.11
Asterisk Asterisk 0.1.7
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.16
Asterisk Asterisk 0.3
Asterisk Asterisk 0.7.2
Asterisk Asterisk 1.2.5
Asterisk Asterisk 0.1.9 1
Asterisk Asterisk 0.1.8
Asterisk Asterisk 1.0.8
Asterisk Asterisk 1.4 Beta
Asterisk Asterisk 1.2.6
Asterisk Asterisk 1.2.7
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 0.9.0
Asterisk Asterisk 1.0.12
Asterisk Asterisk 1.2.8
Asterisk Asterisk 0.7.1
Asterisk Asterisk 1.2.15
Asterisk Asterisk 0.4
Asterisk Asterisk 1.2.17
NA
CVE-2006-4345
Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 up to and including 1.2.10 allows remote malicious users to execute arbitrary code via a crafted audit endpoint (AUEP) response.
Digium Asterisk 1.2.0 Beta1
Digium Asterisk 1.2.10
Digium Asterisk 1.2.9
Digium Asterisk 1.0.9
Digium Asterisk 1.0.2
Digium Asterisk 1.0 Rc2
Digium Asterisk 1.0.10
Digium Asterisk 1.0.1
Digium Asterisk 1.0.3
Digium Asterisk 1.0.5
Digium Asterisk 1.2.8
Digium Asterisk 1.0.6
Digium Asterisk 1.2.6
Digium Asterisk 1.0.4
Digium Asterisk 1.0.8
Digium Asterisk 1.2.7
Digium Asterisk 1.2.0 Beta2
Digium Asterisk 1.0.0
Digium Asterisk 1.0.7
Digium Asterisk 1.0 Rc1
NA
CVE-2007-3765
The STUN implementation in Asterisk 1.4.x prior to 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an ...
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.2.5
Asterisk Asterisk B.1.3.3
Asterisk Asterisknow Beta 6
Asterisk Asterisk 1.0.8
Asterisk Asterisknow Beta 5
Asterisk Asterisk 1.4 Beta
Asterisk Asterisk 1.2.6
Asterisk Asterisk 1.2.7
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.0.12
Asterisk Asterisk B.2.2.0
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.2.15
Asterisk Asterisk Appliance Developer Kit
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.0.6
NA
CVE-2007-3762
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk prior to 1.2.22 and 1.4.x prior to 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to ex...
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.2.5
Asterisk Asterisk B.1.3.3
Asterisk Asterisknow Beta 6
Asterisk Asterisk 1.0.8
Asterisk Asterisknow Beta 5
Asterisk Asterisk 1.4 Beta
Asterisk Asterisk 1.2.6
Asterisk Asterisk 1.2.7
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.0.12
Asterisk Asterisk B.2.2.0
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.2.15
Asterisk Asterisk Appliance Developer Kit
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.0.6
NA
CVE-2007-3763
The IAX2 channel driver (chan_iax2) in Asterisk prior to 1.2.22 and 1.4.x prior to 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to cause a denial of service (crash)...
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.2.5
Asterisk Asterisk B.1.3.3
Asterisk Asterisknow Beta 6
Asterisk Asterisk 1.0.8
Asterisk Asterisknow Beta 5
Asterisk Asterisk 1.4 Beta
Asterisk Asterisk 1.2.6
Asterisk Asterisk 1.2.7
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.0.12
Asterisk Asterisk B.2.2.0
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.2.15
Asterisk Asterisk Appliance Developer Kit
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.0.6
1 EDB exploit
NA
CVE-2007-3764
The Skinny channel driver (chan_skinny) in Asterisk prior to 1.2.22 and 1.4.x prior to 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to cause a denial of service (cr...
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.2.5
Asterisk Asterisk B.1.3.3
Asterisk Asterisknow Beta 6
Asterisk Asterisk 1.0.8
Asterisk Asterisknow Beta 5
Asterisk Asterisk 1.4 Beta
Asterisk Asterisk 1.2.6
Asterisk Asterisk 1.2.7
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.0.12
Asterisk Asterisk B.2.2.0
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.2.15
Asterisk Asterisk Appliance Developer Kit
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.0.6
1 EDB exploit
NA
CVE-2006-5444
Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x prior to 1.0.12 and 1.2.x prior to 1.2.13, as used by Cisco SCCP phones, allows remote malicious users to execute arbitrary code via a certain dlen value that passes a signed...
Digium Asterisk 0.4
Digium Asterisk 1.2.11
Digium Asterisk 1.2.12
Digium Asterisk 1.0
Digium Asterisk 0.7.1
Digium Asterisk 0.1.9
Digium Asterisk 1.2.10
Digium Asterisk 0.7.2
Digium Asterisk 1.2.9
Digium Asterisk 0.2
Digium Asterisk 1.0.9
Digium Asterisk 0.7
Digium Asterisk 1.2 Beta2
Digium Asterisk 1.0.10
Digium Asterisk 0.1.9.1
Digium Asterisk 0.1.8
Digium Asterisk 1.2.8
Digium Asterisk 1.2.6
Digium Asterisk 0.1.7
Digium Asterisk 1.0.8
Digium Asterisk 1.2.7
Digium Asterisk 1.2 Beta1
1 EDB exploit
NA
CVE-2005-3559
Directory traversal vulnerability in vmail.cgi in Asterisk 1.0.9 up to and including 1.2.0-beta1 allows remote malicious users to access WAV files via a .. (dot dot) in the folder parameter.
Digium Asterisk 1.2.0 Beta1
Digium Asterisk 0.7.1
Digium Asterisk 0.1.9
Digium Asterisk 0.2.0
Digium Asterisk 0.1.3
Digium Asterisk 0.3.0
Digium Asterisk 0.7.2
Digium Asterisk 0.5.0
Digium Asterisk 1.0.9
Digium Asterisk 1.0.2
Digium Asterisk 0.1.11
Digium Asterisk 1.0 Rc2
Digium Asterisk 0.1.6
Digium Asterisk 1.0.1
Digium Asterisk 1.0.3
Digium Asterisk 1.0.5
Digium Asterisk 0.1.8
Digium Asterisk 0.1.12
Digium Asterisk 1.0.6
Digium Asterisk 0.1.0
Digium Asterisk 0.1.7
Digium Asterisk 1.0.4
1 EDB exploit
NA
CVE-2006-1827
Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and previous versions allows remote malicious users to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.
Digium Asterisk 0.4
Digium Asterisk 1.2.0 Beta1
Digium Asterisk
Digium Asterisk 0.7.1
Digium Asterisk 0.1.9
Digium Asterisk 0.2.0
Digium Asterisk 0.1.3
Digium Asterisk 0.3.0
Digium Asterisk 0.7.2
Digium Asterisk 0.5.0
Digium Asterisk 0.2
Digium Asterisk 1.0.9
Digium Asterisk 1.0.2
Digium Asterisk 0.1.11
Digium Asterisk 1.0 Rc2
Digium Asterisk 0.1.6
Digium Asterisk 0.1.9.1
Digium Asterisk 1.0.1
Digium Asterisk 1.0.3
Digium Asterisk 1.0.5
Digium Asterisk 0.1.8
Digium Asterisk 0.1.12
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »