Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
digium certified asterisk 13.8 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2017-17850
An issue exists in Asterisk 13.18.4 and older, 14.7.4 and older, 15.1.4 and older, and 13.18-cert1 and older. A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and the PJSI...
Digium Asterisk
Digium Certified Asterisk 13.8
Digium Certified Asterisk 13.1.0
5
CVSSv2
CVE-2018-17281
There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk up to and including 13.23.0, 14.7.x up to and including 14.7.7, and 15.x up to and including 15.6.0 and Certified Asterisk up to and including 13.21-cert2. It allows an malicious user to cr...
Digium Asterisk
Digium Certified Asterisk 13.13
Digium Certified Asterisk 13.1
Digium Certified Asterisk 11.6
Digium Certified Asterisk 13.21
Digium Certified Asterisk 13.8
Debian Debian Linux 8.0
Debian Debian Linux 9.0
3.5
CVSSv2
CVE-2019-13161
An issue exists in Asterisk Open Source up to and including 13.27.0, 14.x and 15.x up to and including 15.7.2, and 16.x up to and including 16.4.0, and Certified Asterisk up to and including 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an m...
Digium Certified Asterisk 11.6
Digium Certified Asterisk 1.8.14.0
Digium Certified Asterisk 11.4.0
Digium Certified Asterisk 13.1.0
Digium Certified Asterisk 11.1.0
Digium Certified Asterisk 1.8.0.0
Digium Certified Asterisk 1.8.10.0
Digium Certified Asterisk 1.8.6.0
Digium Certified Asterisk 1.8.11
Digium Certified Asterisk 13.8
Digium Certified Asterisk 1.8.8.0
Digium Certified Asterisk 1.8.12.0
Digium Certified Asterisk 1.8.3.0
Digium Certified Asterisk 1.8.15
Digium Certified Asterisk 11.3.0
Digium Certified Asterisk 1.8.11.0
Digium Certified Asterisk 1.8.4.0
Digium Certified Asterisk 1.8.5.0
Digium Certified Asterisk 1.8.13.0
Digium Certified Asterisk 1.8.28
Digium Certified Asterisk 11.6.0
Digium Certified Asterisk 1.8.1.0
5
CVSSv2
CVE-2016-9938
An issue exists in Asterisk Open Source 11.x prior to 11.25.1, 13.x prior to 13.13.1, and 14.x prior to 14.2.1 and Certified Asterisk 11.x prior to 11.6-cert16 and 13.x prior to 13.8-cert4. The chan_sip channel driver has a liberal definition for whitespace when attempting to str...
Digium Asterisk 11.0.0
Digium Asterisk 11.0.1
Digium Asterisk 11.10.0
Digium Asterisk 11.10.1
Digium Asterisk 11.14.1
Digium Asterisk 11.14.2
Digium Asterisk 11.19.0
Digium Asterisk 11.2.0
Digium Asterisk 11.21.1
Digium Asterisk 11.1.0
Digium Asterisk 11.12.0
Digium Asterisk 11.12.1
Digium Asterisk 11.16.0
Digium Asterisk 11.17.0
Digium Asterisk 11.2.1
Digium Asterisk 11.2.2
Digium Asterisk 11.23.0
Digium Asterisk 11.23.1
Digium Asterisk 11.5.1
Digium Asterisk 11.6.0
Digium Asterisk 13.0.0
Digium Asterisk 13.11.0
5
CVSSv2
CVE-2016-7551
chain_sip in Asterisk Open Source 11.x prior to 11.23.1 and 13.x 13.11.1 and Certified Asterisk 11.6 prior to 11.6-cert15 and 13.8 prior to 13.8-cert3 allows remote malicious users to cause a denial of service (port exhaustion).
Digium Asterisk 11.0.0
Digium Asterisk 11.0.1
Digium Asterisk 11.0.2
Digium Asterisk 11.1.0
Digium Asterisk 11.6.0
Digium Asterisk 11.6.1
Digium Asterisk 11.7.0
Digium Asterisk 11.8.0
Digium Asterisk 11.15.0
Digium Asterisk 11.15.1
Digium Asterisk 11.16.0
Digium Asterisk 11.17.0
Digium Asterisk 13.0.0
Digium Asterisk 13.0.1
Digium Asterisk 13.7.2
Digium Asterisk 13.8.0
Digium Asterisk 13.8.1
Digium Asterisk 11.1.1
Digium Asterisk 11.3.0
Digium Asterisk 11.5.0
Digium Asterisk 11.9.0
Digium Asterisk 11.10.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started