Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
asterisk open source vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2018-12228
An issue exists in Asterisk Open Source 15.x prior to 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the sys...
Asterisk Open Source
2.1
CVSSv2
CVE-2020-28327
A res_pjsip_session crash exists in Asterisk Open Source 13.x prior to 13.37.1, 16.x prior to 16.14.1, 17.x prior to 17.8.1, and 18.x prior to 18.0.1. and Certified Asterisk prior to 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or...
Asterisk Open Source
Digium Certified Asterisk 16.8
5
CVSSv2
CVE-2008-0095
The SIP channel driver in Asterisk Open Source 1.4.x prior to 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x prior to 1.0.3.4 allows remote malicious users to cause a den...
Asterisk Asterisk Appliance Developer Kit
Asterisk Asterisk Business Edition
Asterisk Asterisknow
Asterisk Open Source
Asterisk S800i
1 EDB exploit
7.5
CVSSv2
CVE-2008-1289
Multiple buffer overflows in Asterisk Open Source 1.4.x prior to 1.4.18.1 and 1.4.19-rc3, Open Source 1.6.x prior to 1.6.0-beta6, Business Edition C.x.x before C.1.6.1, AsteriskNOW 1.0.x prior to 1.0.2, Appliance Developer Kit prior to 1.4 revision 109386, and s800i 1.1.x prior t...
Asterisk Open Source
Asterisk S800i
Asterisk Asterisk Business Edition
Asterisk Asterisknow
Asterisk Asterisk Appliance Developer Kit 1.4
1 EDB exploit
4
CVSSv2
CVE-2020-28242
An issue exists in Asterisk Open Source 13.x prior to 13.37.1, 16.x prior to 16.14.1, 17.x prior to 17.8.1, and 18.x prior to 18.0.1 and Certified Asterisk prior to 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk wil...
Asterisk Open Source
Asterisk Certified Asterisk
Fedoraproject Fedora 33
Debian Debian Linux 9.0
5
CVSSv2
CVE-2017-9359
The multi-part body parser in PJSIP, as used in Asterisk Open Source 13.x prior to 13.15.1 and 14.x prior to 14.4.1, Certified Asterisk 13.13 prior to 13.13-cert4, and other products, allows remote malicious users to cause a denial of service (out-of-bounds read and application c...
Digium Open Source 13.7.0
Digium Open Source 13.10.0
Digium Open Source 13.11.0
Digium Open Source 13.15.0
Digium Open Source 14.2.0
Digium Open Source 13.2.0
Digium Open Source 13.3.0
Digium Open Source 13.5.0
Digium Open Source 13.8.1
Digium Open Source 13.8.2
Digium Open Source 13.12.1
Digium Open Source 13.12.2
Digium Open Source 13.1.0
Digium Open Source 13.6.0
Digium Open Source 13.9.0
Digium Open Source 13.13.0
Digium Open Source 13.14.0
Digium Open Source 13.8.0
Digium Open Source 13.12.0
Digium Open Source 13.0.0
Digium Open Source 13.4.0
Digium Certified Asterisk 13.13.0
5
CVSSv2
CVE-2017-9372
PJSIP, as used in Asterisk Open Source 13.x prior to 13.15.1 and 14.x prior to 14.4.1, Certified Asterisk 13.13 prior to 13.13-cert4, and other products, allows remote malicious users to cause a denial of service (buffer overflow and application crash) via a SIP packet with a cra...
Digium Open Source 13.1.0
Digium Open Source 13.5.0
Digium Open Source 13.6.0
Digium Open Source 13.9.0
Digium Open Source 13.14.0
Digium Open Source 13.15.0
Digium Open Source 13.0.0
Digium Open Source 13.4.0
Digium Open Source 13.8.1
Digium Open Source 13.8.2
Digium Open Source 13.12.2
Digium Open Source 13.13.0
Digium Open Source 13.3.0
Digium Open Source 13.8.0
Digium Open Source 13.12.0
Digium Open Source 13.12.1
Digium Open Source 13.2.0
Digium Open Source 13.7.0
Digium Open Source 13.10.0
Digium Open Source 13.11.0
Digium Open Source 14.0.0
Digium Open Source 14.2.1
5
CVSSv2
CVE-2009-3723
asterisk allows calls on prohibited networks
Asterisk Open Source
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Debian Debian Linux 10.0
7.8
CVSSv2
CVE-2008-3263
The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x prior to 1.2.30, and 1.4.x prior to 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x prior to 1.2.0.1 allows remote ...
Asterisk Asterisk 0.1.2
Asterisk Asterisk 0.1.0
Asterisk Asterisk 0.1.4
Asterisk Asterisk 0.1.5
Asterisk Asterisk 0.3
Asterisk Asterisk 0.4
Asterisk Asterisk 1.0.10
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.19
Asterisk Asterisk 1.2.2
Asterisk Asterisk 1.2.26
Asterisk Asterisk 1.2.26.1
Asterisk Asterisk 1.2.30
Asterisk Asterisk 1.2.4
Asterisk Asterisk 0.1.1
Asterisk Asterisk 0.1.10
Asterisk Asterisk 0.1.6
Asterisk Asterisk 0.1.7
1 EDB exploit
5
CVSSv2
CVE-2010-0441
Asterisk Open Source 1.6.0.x prior to 1.6.0.22, 1.6.1.x prior to 1.6.1.14, and 1.6.2.x prior to 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote malicious users to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field...
Asterisk Asterisk 1.6.0
Asterisk Asterisk 1.6.0.9
Asterisk Asterisk 1.6.0.10
Asterisk Asterisk 1.6.0.17
Asterisk Asterisk 1.6.0.18
Asterisk Asterisk 1.6.0.21
Asterisk Asterisk 1.6.10-rc2
Asterisk Asterisk 1.6.1.7-rc1
Asterisk Asterisk 1.6.1.7-rc2
Asterisk Asterisk 1.6.1.11
Asterisk Asterisk 1.6.1.12
Asterisk Asterisk C.3.1.1
Asterisk Asterisk C.3.1.0
Asterisk Asterisk 1.6.0.6
Asterisk Asterisk 1.6.0.7
Asterisk Asterisk 1.6.0.8
Asterisk Asterisk 1.6.0.16-rc1
Asterisk Asterisk 1.6.0.16-rc2
Asterisk Asterisk 1.6.0.20
Asterisk Asterisk 1.6.0.20-rc1
Asterisk Asterisk 1.6.1.4
Asterisk Asterisk 1.6.1.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »