Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
asterisk certified asterisk vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2022-21723
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potential...
Teluu Pjsip
Asterisk Certified Asterisk 16.8.0
Sangoma Asterisk
Debian Debian Linux 9.0
Debian Debian Linux 10.0
4
CVSSv2
CVE-2016-2232
Asterisk Open Source 1.8.x, 11.x prior to 11.21.1, 12.x, and 13.x prior to 13.7.1 and Certified Asterisk 1.8.28, 11.6 prior to 11.6-cert12, and 13.1 prior to 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via...
Digium Asterisk 13.7.0
Digium Asterisk 13.4.0
Digium Asterisk 13.6.0
Digium Asterisk 13.2.0
Digium Asterisk 13.1.0
Digium Asterisk 12.8.0
Digium Asterisk 12.6.0
Digium Asterisk 12.5.0
Digium Asterisk 12.3.0
Digium Asterisk 12.2.0
Digium Asterisk 12.1.0
Digium Asterisk 11.19.0
Digium Asterisk 11.18.0
Digium Asterisk 11.9.0
Digium Asterisk 11.8.0
Digium Asterisk 11.7.0
Digium Asterisk 11.2.0
Digium Asterisk 11.14.0
Digium Asterisk 11.11.0
Digium Asterisk 11.10.1
Digium Asterisk 11.1.0
Digium Asterisk 11.0.0
NA
CVE-2021-46837
res_pjsip_t38 in Sangoma Asterisk 16.x prior to 16.16.2, 17.x prior to 17.9.3, and 18.x prior to 18.2.2, and Certified Asterisk prior to 16.8-cert7, allows an malicious user to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by...
Asterisk Certified Asterisk 16.8.0
Digium Asterisk
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
7.1
CVSSv2
CVE-2016-2316
chan_sip in Asterisk Open Source 1.8.x, 11.x prior to 11.21.1, 12.x, and 13.x prior to 13.7.1 and Certified Asterisk 1.8.28, 11.6 prior to 11.6-cert12, and 13.1 prior to 13.1-cert3, when the timert1 sip.conf configuration is set to a value greater than 1245, allows remote malicio...
Fedoraproject Fedora 22
Fedoraproject Fedora 23
Digium Asterisk 13.5.0
Digium Asterisk 13.1.0
Digium Asterisk 13.0.1
Digium Asterisk 12.7.1
Digium Asterisk 12.7.0
Digium Asterisk 12.5.0
Digium Asterisk 12.4.0
Digium Asterisk 12.2.0
Digium Asterisk 12.0.0
Digium Asterisk 11.21.0
Digium Asterisk 11.17.0
Digium Asterisk 11.16.0
Digium Asterisk 11.9.0
Digium Asterisk 11.7.0
Digium Asterisk 11.14.0
Digium Asterisk 11.13.0
Digium Asterisk 13.7.0
Digium Asterisk 13.2.0
Digium Asterisk 12.8.1
Digium Asterisk 12.8.0
5
CVSSv2
CVE-2014-4047
Asterisk Open Source 1.8.x prior to 1.8.28.1, 11.x prior to 11.10.1, and 12.x prior to 12.3.1 and Certified Asterisk 1.8.15 prior to 1.8.15-cert6 and 11.6 prior to 11.6-cert3 allows remote malicious users to cause a denial of service (connection consumption) via a large number of...
Digium Certified Asterisk 1.8.15
Digium Asterisk 1.8.28.0
Digium Asterisk 1.8.27.0
Digium Asterisk 1.8.0
Digium Asterisk 1.8.1.2
Digium Asterisk 1.8.10.0
Digium Asterisk 1.8.11.0
Digium Asterisk 1.8.12
Digium Asterisk 1.8.12.0
Digium Asterisk 1.8.13.0
Digium Asterisk 1.8.14.1
Digium Asterisk 1.8.16.0
Digium Asterisk 1.8.18.0
Digium Asterisk 1.8.2
Digium Asterisk 1.8.2.1
Digium Asterisk 1.8.20.0
Digium Asterisk 1.8.20.1
Digium Asterisk 1.8.22.0
Digium Asterisk 1.8.24.0
Digium Asterisk 1.8.3
Digium Asterisk 1.8.4
Digium Asterisk 1.8.5
5
CVSSv2
CVE-2021-32558
An issue exists in Sangoma Asterisk 13.x prior to 13.38.3, 16.x prior to 16.19.1, 17.x prior to 17.9.4, and 18.x prior to 18.5.1, and Certified Asterisk prior to 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported media format, a crash can occur...
Digium Asterisk
Digium Certified Asterisk 16.8
Debian Debian Linux 9.0
Debian Debian Linux 11.0
5.8
CVSSv2
CVE-2019-18790
An issue exists in channels/chan_sip.c in Sangoma Asterisk 13.x prior to 13.29.2, 16.x prior to 16.6.2, and 17.x prior to 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not nee...
Digium Certified Asterisk 13.21.0
Digium Asterisk
Debian Debian Linux 8.0
Debian Debian Linux 9.0
9
CVSSv2
CVE-2019-18610
An issue exists in manager.c in Sangoma Asterisk up to and including 13.x, 16.x, 17.x and Certified Asterisk 13.21 up to and including 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AM...
Digium Certified Asterisk 13.21.0
Digium Asterisk
Debian Debian Linux 8.0
Debian Debian Linux 9.0
7.5
CVSSv2
CVE-2022-26651
An issue exists in Asterisk up to and including 19.x and Certified Asterisk up to and including 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a broken SQL que...
Digium Certified Asterisk 16.8
Digium Asterisk
Debian Debian Linux 10.0
Debian Debian Linux 11.0
4
CVSSv2
CVE-2012-2948
chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert prior to 1.8.11-cert2 and Asterisk Open Source 1.8.x prior to 1.8.12.1 and 10.x prior to 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and dae...
Asterisk Certified Asterisk 1.8.11
Asterisk Open Source
Asterisk Open Source 1.8.12.0
Asterisk Open Source 1.8.10.0
Asterisk Open Source 1.8.9.0
Asterisk Open Source 1.8.8.0
Asterisk Open Source 1.8.7.0
Asterisk Open Source 1.8.6.0
Asterisk Open Source 1.8.2
Asterisk Open Source 1.8.0
Asterisk Open Source 1.8.11.0
Asterisk Open Source 1.8.5
Asterisk Open Source 1.8.3
Asterisk Open Source 1.8.1
Asterisk Open Source 1.8.12
Asterisk Open Source 1.8.5.0
Asterisk Open Source 10.4.0
Asterisk Open Source 10.2.0
Asterisk Open Source 10.0.0
Asterisk Open Source 10.3.0
Asterisk Open Source 10.1.0
Asterisk Open Source 10.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »