Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
asterisk asterisk 1.4.2 vulnerabilities and exploits
(subscribe to this query)
770
VMScore
CVE-2007-2293
Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk prior to 1.4.3 allow remote malicious users to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP mess...
Asterisk Asterisk 1.4.1
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.4 Beta
2 EDB exploits
694
VMScore
CVE-2007-2297
The SIP channel driver (chan_sip) in Asterisk prior to 1.2.18 and 1.4.x prior to 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote malicious users to cause a denial of service (crash).
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.4.1
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.2.15
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.4 Beta
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.14
694
VMScore
CVE-2007-2294
The Manager Interface in Asterisk prior to 1.2.18 and 1.4.x prior to 1.4.3 allows remote malicious users to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dere...
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.2.6
Asterisk Asterisk 1.2.7
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.2.5
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.9
Asterisk Asterisk 1.4.1
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.2.15
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.4 Beta
445
VMScore
CVE-2008-2543
The ooh323 channel driver in Asterisk Addons 1.2.x prior to 1.2.9 and Asterisk-Addons 1.4.x prior to 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, w...
Asterisk Asterisk-addons 1.2.1
Asterisk Asterisk-addons 1.2.2
Asterisk Asterisk-addons 1.2.3
Asterisk Asterisk-addons 1.4.1
Asterisk Asterisk-addons 1.4.2
Asterisk Asterisk-addons 1.2.6
Asterisk Asterisk-addons 1.2.7
Asterisk Asterisk-addons 1.4.5
Asterisk Asterisk-addons 1.4.6
Asterisk Asterisk-addons 1.2.4
Asterisk Asterisk-addons 1.2.5
Asterisk Asterisk-addons 1.4.3
Asterisk Asterisk-addons 1.4.4
Asterisk Asterisk-addons 1.2.0
Asterisk Asterisk-addons 1.2.8
Asterisk Asterisk-addons 1.4.0
828
VMScore
CVE-2007-3762
Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk prior to 1.2.22 and 1.4.x prior to 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to ex...
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.2.9
Asterisk Asterisk B.1.3.3
Asterisk Asterisk B.2.2.0
Asterisk Asterisk 1.0
Asterisk Asterisk 1.0.10
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.0.12
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.5
Asterisk Asterisk 1.2.6
Asterisk Asterisk 1.2.7
Asterisk Asterisk A
Asterisk Asterisk B.1.3.2
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.16
505
VMScore
CVE-2007-3763
The IAX2 channel driver (chan_iax2) in Asterisk prior to 1.2.22 and 1.4.x prior to 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to cause a denial of service (crash)...
Asterisk Asterisk 1.0
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.0.8
Asterisk Asterisk 1.0.9
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.15
Asterisk Asterisk 1.2.9
Asterisk Asterisk 1.4.1
Asterisk Asterisknow Beta 5
Asterisk Asterisknow Beta 6
Asterisk Asterisk 1.4.4 2007-04-27
Asterisk Asterisk Appliance Developer Kit
Asterisk Asterisk 1.0.12
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.7
1 EDB exploit
505
VMScore
CVE-2007-3764
The Skinny channel driver (chan_skinny) in Asterisk prior to 1.2.22 and 1.4.x prior to 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to cause a denial of service (cr...
Asterisk Asterisk 1.0.10
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.5
Asterisk Asterisk 1.2.6
Asterisk Asterisk 1.4 Beta
Asterisk Asterisk A
Asterisk Asterisk 1.0.12
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.12
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.7
Asterisk Asterisk 1.2.8
Asterisk Asterisk B.1.3.2
Asterisk Asterisk B.1.3.3
Asterisk Asterisk 1.0
Asterisk Asterisk 1.0.9
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.2.17
1 EDB exploit
445
VMScore
CVE-2007-3765
The STUN implementation in Asterisk 1.4.x prior to 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit prior to 0.5.0, and s800i prior to 1.0.2 allows remote malicious users to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an ...
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.0.8
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.2.9
Asterisk Asterisk 1.4.1
Asterisk Asterisk B.2.2.0
Asterisk Asterisknow Beta 5
Asterisk Asterisk 1.0
Asterisk Asterisk 1.0.9
Asterisk Asterisk 1.2.0 Beta1
Asterisk Asterisk 1.2.15
Asterisk Asterisk 1.2.16
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.4.4 2007-04-27
Asterisk Asterisknow Beta 6
Asterisk Asterisk Appliance Developer Kit
Asterisk Asterisk 1.0.12
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.12
694
VMScore
CVE-2007-1594
The handle_response function in chan_sip.c in Asterisk prior to 1.2.17 and 1.4.x prior to 1.4.2 allows remote malicious users to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
Asterisk Asterisk 0.1.9 1
Asterisk Asterisk 0.2
Asterisk Asterisk 1.0
Asterisk Asterisk 1.0.10
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.2.5
Asterisk Asterisk 0.1.11
Asterisk Asterisk 0.1.7
Asterisk Asterisk 0.7.0
Asterisk Asterisk 0.7.1
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.2.9
Asterisk Asterisk 0.3
Asterisk Asterisk 0.4
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.0.12
828
VMScore
CVE-2008-1390
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x prior to 1.4.19-rc3 and 1.6.x prior to 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW prior to 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x prior to 1.1.0.2 generates insufficiently...
Asterisk Asterisk 1.4.1
Asterisk Asterisk 1.4.16
Asterisk Asterisk 1.4.17
Asterisk Asterisk 1.4.8
Asterisk Asterisk 1.4.9
Asterisk Asterisk Appliance Developer Kit 0.5
Asterisk Asterisk Appliance Developer Kit 0.6
Asterisk Asterisknow Beta 5
Asterisk Asterisknow Beta 6
Asterisk Asterisk 1.4.10
Asterisk Asterisk 1.4.11
Asterisk Asterisk 1.4.18.1
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.4.3
Asterisk Asterisk 1.4 Beta
Asterisk Asterisk 1.4 Revision 95946
Asterisk Asterisk Appliance Developer Kit 0.7
Asterisk Asterisk Appliance Developer Kit 0.8
Asterisk Asterisknow Beta 7
Asterisk S800i 1.0
Asterisk S800i 1.0.1
Asterisk Asterisk 1.4.12
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »