Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
asterisk asterisk 1.0.9 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2006-2898
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x prior to 1.2.9 and 1.0.x prior to 1.0.11 allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buff...
Digium Asterisk 1.2.0 Beta1
Digium Asterisk 1.2.0 Beta2
Digium Asterisk 1.0.10
Digium Asterisk 1.0.7
Digium Asterisk 1.2.8
Digium Asterisk 1.2.6
Digium Asterisk 1.2.7
Digium Asterisk 1.0.8
Digium Asterisk 1.0.9
694
VMScore
CVE-2007-1594
The handle_response function in chan_sip.c in Asterisk prior to 1.2.17 and 1.4.x prior to 1.4.2 allows remote malicious users to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
Asterisk Asterisk 0.1.9 1
Asterisk Asterisk 0.2
Asterisk Asterisk 1.0
Asterisk Asterisk 1.0.10
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.2.5
Asterisk Asterisk 0.1.11
Asterisk Asterisk 0.1.7
Asterisk Asterisk 0.7.0
Asterisk Asterisk 0.7.1
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.2.9
Asterisk Asterisk 0.3
Asterisk Asterisk 0.4
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.0.12
668
VMScore
CVE-2006-4345
Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 up to and including 1.2.10 allows remote malicious users to execute arbitrary code via a crafted audit endpoint (AUEP) response.
Digium Asterisk 1.0.5
Digium Asterisk 1.0.6
Digium Asterisk 1.2.0 Beta2
Digium Asterisk 1.2.10
Digium Asterisk 1.0.10
Digium Asterisk 1.0.2
Digium Asterisk 1.0.9
Digium Asterisk 1.0 Rc1
Digium Asterisk 1.2.8
Digium Asterisk 1.0.0
Digium Asterisk 1.0.1
Digium Asterisk 1.0.7
Digium Asterisk 1.0.8
Digium Asterisk 1.2.6
Digium Asterisk 1.2.7
Digium Asterisk 1.2.9
Digium Asterisk 1.0.3
Digium Asterisk 1.0.4
Digium Asterisk 1.0 Rc2
Digium Asterisk 1.2.0 Beta1
505
VMScore
CVE-2007-3764
The Skinny channel driver (chan_skinny) in Asterisk prior to 1.2.22 and 1.4.x prior to 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to cause a denial of service (cr...
Asterisk Asterisk 1.0.10
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.5
Asterisk Asterisk 1.2.6
Asterisk Asterisk 1.4 Beta
Asterisk Asterisk A
Asterisk Asterisk 1.0.12
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.7
Asterisk Asterisk 1.2.8
Asterisk Asterisk B.1.3.2
Asterisk Asterisk B.1.3.3
Asterisk Asterisk 1.0
Asterisk Asterisk 1.0.9
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.2.17
1 EDB exploit
828
VMScore
CVE-2007-3762
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk prior to 1.2.22 and 1.4.x prior to 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to ex...
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.2.9
Asterisk Asterisk B.1.3.3
Asterisk Asterisk B.2.2.0
Asterisk Asterisk 1.0
Asterisk Asterisk 1.0.10
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.0.12
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.5
Asterisk Asterisk 1.2.6
Asterisk Asterisk 1.2.7
Asterisk Asterisk A
Asterisk Asterisk B.1.3.2
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.16
505
VMScore
CVE-2007-3763
The IAX2 channel driver (chan_iax2) in Asterisk prior to 1.2.22 and 1.4.x prior to 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to cause a denial of service (crash)...
Asterisk Asterisk 1.0
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.0.8
Asterisk Asterisk 1.0.9
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.15
Asterisk Asterisk 1.2.9
Asterisk Asterisk 1.4.1
Asterisk Asterisknow Beta 5
Asterisk Asterisknow Beta 6
Asterisk Asterisk 1.4.4 2007-04-27
Asterisk Asterisk Appliance Developer Kit
Asterisk Asterisk 1.0.12
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.7
1 EDB exploit
445
VMScore
CVE-2007-3765
The STUN implementation in Asterisk 1.4.x prior to 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an ...
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.0.8
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.2.9
Asterisk Asterisk 1.4.1
Asterisk Asterisk B.2.2.0
Asterisk Asterisknow Beta 5
Asterisk Asterisk 1.0
Asterisk Asterisk 1.0.9
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.2.15
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.4.4 2007-04-27
Asterisk Asterisknow Beta 6
Asterisk Asterisk Appliance Developer Kit
Asterisk Asterisk 1.0.12
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.12
755
VMScore
CVE-2006-5444
Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x prior to 1.0.12 and 1.2.x prior to 1.2.13, as used by Cisco SCCP phones, allows remote malicious users to execute arbitrary code via a certain dlen value that passes a signed...
Digium Asterisk 0.4
Digium Asterisk 0.7
Digium Asterisk 1.0.8
Digium Asterisk 1.0.9
Digium Asterisk 1.2.9
Digium Asterisk 1.2 Beta1
Digium Asterisk 0.2
Digium Asterisk 0.3
Digium Asterisk 1.0.11
Digium Asterisk 1.0.7
Digium Asterisk 1.2.7
Digium Asterisk 1.2.8
Digium Asterisk 0.1.7
Digium Asterisk 0.1.8
Digium Asterisk 0.7.1
Digium Asterisk 0.7.2
Digium Asterisk 1.2.10
Digium Asterisk 1.2.11
Digium Asterisk 1.2 Beta2
Digium Asterisk 0.1.9
Digium Asterisk 0.1.9.1
Digium Asterisk 0.9
1 EDB exploit
505
VMScore
CVE-2005-3559
Directory traversal vulnerability in vmail.cgi in Asterisk 1.0.9 up to and including 1.2.0-beta1 allows remote malicious users to access WAV files via a .. (dot dot) in the folder parameter.
Digium Asterisk 0.1.1
Digium Asterisk 0.1.10
Digium Asterisk 0.1.11
Digium Asterisk 0.1.7
Digium Asterisk 0.1.8
Digium Asterisk 0.7.1
Digium Asterisk 0.7.2
Digium Asterisk 1.0.6
Digium Asterisk 1.0.7
Digium Asterisk 1.0.8
Digium Asterisk 0.1.0
Digium Asterisk 0.1.5
Digium Asterisk 0.1.6
Digium Asterisk 0.5.0
Digium Asterisk 0.7.0
Digium Asterisk 1.0.4
Digium Asterisk 1.0.5
Digium Asterisk 0.1.12
Digium Asterisk 0.1.2
Digium Asterisk 0.1.9
Digium Asterisk 0.2.0
Digium Asterisk 1.0.0
1 EDB exploit
570
VMScore
CVE-2006-1827
Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and previous versions allows remote malicious users to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.
Digium Asterisk 0.1.10
Digium Asterisk 0.1.11
Digium Asterisk 0.1.12
Digium Asterisk 0.1.8
Digium Asterisk 0.1.9
Digium Asterisk 0.4.0
Digium Asterisk 0.5.0
Digium Asterisk 1.0.3
Digium Asterisk 1.0.4
Digium Asterisk 1.0.5
Digium Asterisk 1.2.0 Beta1
Digium Asterisk
Digium Asterisk 0.1.0
Digium Asterisk 0.1.1
Digium Asterisk 0.1.6
Digium Asterisk 0.1.7
Digium Asterisk 0.3.0
Digium Asterisk 0.4
Digium Asterisk 1.0.1
Digium Asterisk 1.0.2
Digium Asterisk 1.0 Rc1
Digium Asterisk 1.0 Rc2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »