Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
automon vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-6727
The Mikeius (Official App) (aka com.automon.mikeius) application 1.4.2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Automon Mikeius 1.4.2.0
NA
CVE-2014-7455
The Zoella Unofficial (aka com.automon.ay.zoella) application 1.4.0.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Automon Zoella Unofficial 1.4.0.5
NA
CVE-2014-6852
The LedLine.gr Official (aka com.automon.ledline.gr) application 1.4.0.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Automon Ledline.gr Official 1.4.0.9
NA
CVE-2014-6942
The Alisha Marie (Unofficial) (aka com.automon.ay.alisha.marie) application 1.4.0.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Automon Alisha Marie 1.4.0.6
NA
CVE-2014-7568
The Marcus Butler Unofficial (aka com.automon.ay.marcus.butler) application 1.4.0.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Automon Marcus Butler Unofficial 1.4.0.6
NA
CVE-2011-4598
The handle_request_info function in channels/chan_sip.c in Asterisk Open Source 1.6.2.x prior to 1.6.2.21 and 1.8.x prior to 1.8.7.2, when automon is enabled, allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted sequ...
Digium Asterisk 1.8.4
Digium Asterisk 1.8.3.3
Digium Asterisk 1.8.0
Digium Asterisk 1.8.2.2
Digium Asterisk 1.8.2.1
Digium Asterisk 1.8.3
Digium Asterisk 1.8.3.2
Digium Asterisk 1.8.4.1
Digium Asterisk 1.8.2
Digium Asterisk 1.8.2.4
Digium Asterisk 1.8.4.2
Digium Asterisk 1.8.4.3
Digium Asterisk 1.8.6.0
Digium Asterisk 1.8.1.1
Digium Asterisk 1.8.2.3
Digium Asterisk 1.8.3.1
Digium Asterisk 1.8.5
Digium Asterisk 1.8.5.0
Digium Asterisk 1.8.7.0
Digium Asterisk 1.8.7.1
Digium Asterisk 1.8.1.2
Digium Asterisk 1.8.1
NA
CVE-2011-4597
The SIP over UDP implementation in Asterisk Open Source 1.4.x prior to 1.4.43, 1.6.x prior to 1.6.2.21, and 1.8.x prior to 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote malicious users to enum...
Digium Asterisk 1.8.1.2
Digium Asterisk 1.8.1
Digium Asterisk 1.8.0
Digium Asterisk 1.8.3
Digium Asterisk 1.8.4.4
Digium Asterisk 1.8.5
Digium Asterisk 1.8.7.0
Digium Asterisk 1.8.4
Digium Asterisk 1.8.4.1
Digium Asterisk 1.8.2
Digium Asterisk 1.8.2.4
Digium Asterisk 1.8.4.2
Digium Asterisk 1.8.4.3
Digium Asterisk 1.8.6.0
Digium Asterisk 1.8.3.3
Digium Asterisk 1.8.2.2
Digium Asterisk 1.8.2.1
Digium Asterisk 1.8.3.2
Digium Asterisk 1.8.1.1
Digium Asterisk 1.8.2.3
Digium Asterisk 1.8.3.1
Digium Asterisk 1.8.5.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started