Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
asterisk asterisk 0.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0779
SQL injection vulnerability in the Call Detail Record (CDR) logging functionality for Asterisk allows remote malicious users to execute arbitrary SQL via a CallerID string.
Digium Asterisk 0.3
Digium Asterisk 0.4
Digium Asterisk 0.1.7
Digium Asterisk 0.1.8
Digium Asterisk 0.1.9.1
Digium Asterisk 0.1.9
Digium Asterisk 0.2
NA
CVE-2007-1594
The handle_response function in chan_sip.c in Asterisk prior to 1.2.17 and 1.4.x prior to 1.4.2 allows remote malicious users to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
Asterisk Asterisk 0.1.9 1
Asterisk Asterisk 0.2
Asterisk Asterisk 1.0
Asterisk Asterisk 1.0.10
Asterisk Asterisk 1.2.0 Beta2
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.17
Asterisk Asterisk 1.2.5
Asterisk Asterisk 0.1.11
Asterisk Asterisk 0.1.7
Asterisk Asterisk 0.7.0
Asterisk Asterisk 0.7.1
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.2.13
Asterisk Asterisk 1.2.14
Asterisk Asterisk 1.2.8
Asterisk Asterisk 1.2.9
Asterisk Asterisk 0.3
Asterisk Asterisk 0.4
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.0.12
NA
CVE-2006-5444
Integer overflow in the get_input function in the Skinny channel driver (chan_skinny.c) in Asterisk 1.0.x prior to 1.0.12 and 1.2.x prior to 1.2.13, as used by Cisco SCCP phones, allows remote malicious users to execute arbitrary code via a certain dlen value that passes a signed...
Digium Asterisk 0.4
Digium Asterisk 0.7
Digium Asterisk 1.0.8
Digium Asterisk 1.0.9
Digium Asterisk 1.2.9
Digium Asterisk 1.2 Beta1
Digium Asterisk 0.2
Digium Asterisk 0.3
Digium Asterisk 1.0.11
Digium Asterisk 1.0.7
Digium Asterisk 1.2.7
Digium Asterisk 1.2.8
Digium Asterisk 0.1.7
Digium Asterisk 0.1.8
Digium Asterisk 0.7.1
Digium Asterisk 0.7.2
Digium Asterisk 1.2.10
Digium Asterisk 1.2.11
Digium Asterisk 1.2 Beta2
Digium Asterisk 0.1.9
Digium Asterisk 0.1.9.1
Digium Asterisk 0.9
1 EDB exploit
NA
CVE-2008-1390
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x prior to 1.4.19-rc3 and 1.6.x prior to 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW prior to 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x prior to 1.1.0.2 generates insufficiently...
Asterisk Asterisk 1.4.1
Asterisk Asterisk 1.4.16
Asterisk Asterisk 1.4.17
Asterisk Asterisk 1.4.8
Asterisk Asterisk 1.4.9
Asterisk Asterisk Appliance Developer Kit 0.5
Asterisk Asterisk Appliance Developer Kit 0.6
Asterisk Asterisknow Beta 5
Asterisk Asterisknow Beta 6
Asterisk Asterisk 1.4.10
Asterisk Asterisk 1.4.11
Asterisk Asterisk 1.4.18.1
Asterisk Asterisk 1.4.2
Asterisk Asterisk 1.4.3
Asterisk Asterisk 1.4 Beta
Asterisk Asterisk 1.4 Revision 95946
Asterisk Asterisk Appliance Developer Kit 0.7
Asterisk Asterisk Appliance Developer Kit 0.8
Asterisk Asterisknow Beta 7
Asterisk S800i 1.0
Asterisk S800i 1.0.1
Asterisk Asterisk 1.4.12
NA
CVE-2006-1827
Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and previous versions allows remote malicious users to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.
Digium Asterisk 0.1.10
Digium Asterisk 0.1.11
Digium Asterisk 0.1.12
Digium Asterisk 0.1.8
Digium Asterisk 0.1.9
Digium Asterisk 0.4.0
Digium Asterisk 0.5.0
Digium Asterisk 1.0.3
Digium Asterisk 1.0.4
Digium Asterisk 1.0.5
Digium Asterisk 1.2.0 Beta1
Digium Asterisk
Digium Asterisk 0.1.0
Digium Asterisk 0.1.1
Digium Asterisk 0.1.6
Digium Asterisk 0.1.7
Digium Asterisk 0.3.0
Digium Asterisk 0.4
Digium Asterisk 1.0.1
Digium Asterisk 1.0.2
Digium Asterisk 1.0 Rc1
Digium Asterisk 1.0 Rc2
NA
CVE-2008-3263
The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x prior to 1.2.30, and 1.4.x prior to 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x prior to 1.2.0.1 allows remote ...
Asterisk Asterisk 0.1.2
Asterisk Asterisk 0.1.0
Asterisk Asterisk 0.1.4
Asterisk Asterisk 0.1.5
Asterisk Asterisk 0.3
Asterisk Asterisk 0.4
Asterisk Asterisk 1.0.10
Asterisk Asterisk 1.0.11
Asterisk Asterisk 1.0.6
Asterisk Asterisk 1.0.7
Asterisk Asterisk 1.2.10
Asterisk Asterisk 1.2.11
Asterisk Asterisk 1.2.19
Asterisk Asterisk 1.2.2
Asterisk Asterisk 1.2.26
Asterisk Asterisk 1.2.26.1
Asterisk Asterisk 1.2.30
Asterisk Asterisk 1.2.4
Asterisk Asterisk 0.1.1
Asterisk Asterisk 0.1.10
Asterisk Asterisk 0.1.6
Asterisk Asterisk 0.1.7
1 EDB exploit
NA
CVE-2008-3264
The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x prior to 1.2.30, and 1.4.x prior to 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x prior to 1.2.0.1 al...
Asterisk Asterisk Appliance Developer Kit 0.5
Asterisk Asterisk Appliance Developer Kit 0.6
Asterisk Asterisk Business Edition B.1.3.3
Asterisk Asterisk Business Edition B.2.2.0
Asterisk Asterisk Business Edition B.2.5.0
Asterisk Asterisk Business Edition B.2.5.3
Asterisk Asterisk Business Edition C.1.6.2
Asterisk Asterisk Business Edition C1.8.0
Asterisk Open Source 1.0.0
Asterisk Asterisk Appliance Developer Kit 0.8
Asterisk Asterisk Business Edition A
Asterisk Asterisk Business Edition B.2.3.2
Asterisk Asterisk Business Edition B.2.3.3
Asterisk Asterisk Business Edition C
Asterisk Asterisk Business Edition C.1.0-beta7
Asterisk Asterisk Business Edition C.1.0-beta8
Asterisk Asterisknow Beta 6
Asterisk Asterisknow Beta 7
Asterisk Open Source 1.0.12
Asterisk Open Source 1.0.2
Asterisk Open Source 1.0.9
Asterisk Open Source 1.2.0
NA
CVE-2008-1332
Unspecified vulnerability in Asterisk Open Source 1.2.x prior to 1.2.27, 1.4.x prior to 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x prior to 1.0.2; Appliance Developer Kit prior to 1.4 revision 109393; and s80...
Asterisk Asterisk Business Edition
Asterisk Open Source 1.0
Asterisk Open Source 1.0.0
Asterisk Open Source 1.0.4
Asterisk Open Source 1.0.5
Asterisk Open Source 1.2.9.1
Asterisk Open Source 1.2.9
Asterisk Open Source 1.2.25
Asterisk Open Source 1.2.24
Asterisk Open Source 1.2.18
Asterisk Open Source 1.2.17
Asterisk Open Source 1.2.11
Asterisk Open Source 1.2.10
Asterisk Open Source 1.4.0
Asterisk Open Source 1.4.10.1
Asterisk Open Source 1.4.12
Asterisk Open Source 1.4.18
Asterisk Open Source 1.4.19
Asterisk Asterisk B.1.3.2
Asterisk Asterisk B.2.3.5
Asterisk Asterisk B.2.3.4
Asterisk Open Source 1.2.6
NA
CVE-2008-1897
The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x prior to 1.2.28, and 1.4.x prior to 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW prior to 1.0.3; Appliance Developer Kit 0.x.x; and s800i prior to 1.1.0.3, wh...
Asterisk Asterisk Business Edition C.1.6.2
Asterisk Asterisk Appliance Developer Kit 0.3
Asterisk Asterisk Business Edition B.2.2.0
Asterisk Open Source 1.2.4
Asterisk Open Source 1.2.8
Asterisk Asterisk Appliance Developer Kit 0.6
Asterisk Open Source 1.2.16
Asterisk Asterisk Business Edition C.1.6.1
Asterisk Open Source 1.0.1
Asterisk S800i 1.0.3.3
Asterisk Open Source 1.2.14
Asterisk S800i 1.0
Asterisk S800i 1.0.2
Asterisk Open Source 1.2.20
Asterisk Open Source
Asterisk Open Source 1.0.11
Asterisk Asterisk Business Edition C.1.0
Asterisk Open Source 1.2.12
Asterisk Open Source 1.2.19
Asterisk Asterisk Business Edition
Asterisk Open Source 1.0.4
Asterisk Open Source 1.0
NA
CVE-2003-1137
Charles Steinkuehler sh-httpd 0.3 and 0.4 allows remote malicious users to read files or execute arbitrary CGI scripts via a GET request that contains an asterisk (*) wildcard character.
Charles Steinkuehler Sh-httpd 0.4
Charles Steinkuehler Sh-httpd 0.3
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started