Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
digium asterisk 13.0.1 vulnerabilities and exploits
(subscribe to this query)
801
VMScore
CVE-2014-8418
The DB dialplan function in Asterisk Open Source 1.8.x prior to 1.8.32, 11.x prior to 11.1.4.1, 12.x prior to 12.7.1, and 13.x prior to 13.0.1 and Certified Asterisk 1.8 prior to 1.8.28-cert8 and 11.6 prior to 11.6-cert8 allows remote authenticated users to gain privileges via a ...
Digium Certified Asterisk 11.6
Digium Certified Asterisk 1.8.28
Digium Certified Asterisk 11.6.0
Digium Asterisk
668
VMScore
CVE-2017-14100
In Asterisk 11.x prior to 11.25.2, 13.x prior to 13.17.1, and 14.x prior to 14.6.1 and Certified Asterisk 11.x prior to 11.6-cert17 and 13.x prior to 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program configurati...
Digium Asterisk 13.1.0
Digium Asterisk 13.2.1
Digium Asterisk 13.8.0
Digium Asterisk 13.15.0
Digium Asterisk 13.7.0
Digium Asterisk 13.7.1
Digium Asterisk 13.12
Digium Asterisk 13.1.1
Digium Asterisk 13.14.0
Digium Asterisk 13.4.0
Digium Asterisk 13.17.0
Digium Asterisk 13.2.0
Digium Asterisk 13.3.2
Digium Asterisk 13.0.1
Digium Asterisk 13.10.0
Digium Asterisk 13.6.0
Digium Asterisk 13.0.0
Digium Asterisk 13.11.1
Digium Asterisk 13.13.1
Digium Asterisk 13.11.0
Digium Asterisk 13.9.0
Digium Asterisk 13.12.0
668
VMScore
CVE-2014-8413
The res_pjsip_acl module in Asterisk Open Source 12.x prior to 12.7.1 and 13.x prior to 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote malicious users to bypass intended PJSIP ACL rules.
Digium Asterisk
632
VMScore
CVE-2016-2316
chan_sip in Asterisk Open Source 1.8.x, 11.x prior to 11.21.1, 12.x, and 13.x prior to 13.7.1 and Certified Asterisk 1.8.28, 11.6 prior to 11.6-cert12, and 13.1 prior to 13.1-cert3, when the timert1 sip.conf configuration is set to a value greater than 1245, allows remote malicio...
Fedoraproject Fedora 22
Fedoraproject Fedora 23
Digium Asterisk 1.8.3
Digium Asterisk 1.8.8.0
Digium Asterisk 13.1.0
Digium Asterisk 1.8.11.0
Digium Asterisk 1.8.24.1
Digium Asterisk 12.0.0
Digium Asterisk 1.8.2.4
Digium Certified Asterisk 11.6
Digium Certified Asterisk 13.1.0
Digium Asterisk 1.8.20.2
Digium Asterisk 1.8.0
Digium Asterisk 13.7.0
Digium Asterisk 1.8.6.0
Digium Asterisk 12.3.1
Digium Asterisk 1.8.1
Digium Asterisk 11.21.0
Digium Asterisk 1.8.1.2
Digium Asterisk 11.8.0
Digium Asterisk 1.8.7.1
Digium Asterisk 11.0.0
578
VMScore
CVE-2017-7617
Remote code execution can occur in Asterisk Open Source 13.x prior to 13.14.1 and 14.x prior to 14.3.1 and Certified Asterisk 13.13 prior to 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan function, and the AMI M...
Digium Asterisk 13.1.0
Digium Asterisk 13.2.1
Digium Asterisk 14.3.0
Digium Asterisk 13.8.0
Digium Asterisk 14.2.1
Digium Asterisk 13.7.0
Digium Asterisk 13.7.1
Digium Asterisk 13.12
Digium Asterisk 13.1.1
Digium Asterisk 14.02
Digium Asterisk 13.4.0
Digium Asterisk 14.0.0
Digium Asterisk 13.2.0
Digium Asterisk 13.3.2
Digium Asterisk 13.0.1
Digium Asterisk 14.1.1
Digium Asterisk 13.10.0
Digium Asterisk 13.6.0
Digium Asterisk 13.0.0
Digium Asterisk 13.11.1
Digium Asterisk 13.11.0
Digium Asterisk 13.9.0
578
VMScore
CVE-2014-8417
ConfBridge in Asterisk 11.x prior to 11.14.1, 12.x prior to 12.7.1, and 13.x prior to 13.0.1 and Certified Asterisk 11.6 prior to 11.6-cert8 allows remote authenticated users to (1) gain privileges via vectors related to an external protocol to the CONFBRIDGE dialplan function or...
Digium Asterisk
Digium Certified Asterisk 11.6
Digium Certified Asterisk 11.6.0
445
VMScore
CVE-2017-14603
In Asterisk 11.x prior to 11.25.3, 13.x prior to 13.17.2, and 14.x prior to 14.6.2 and Certified Asterisk 11.x prior to 11.6-cert18 and 13.x prior to 13.13-cert6, insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the "nat&qu...
Digium Asterisk 13.1.0
Digium Asterisk 13.2.1
Digium Asterisk 13.8.0
Digium Asterisk 13.15.0
Digium Asterisk 13.7.0
Digium Asterisk 13.7.1
Digium Asterisk 13.12
Digium Asterisk 13.1.1
Digium Asterisk 13.14.0
Digium Asterisk 13.4.0
Digium Asterisk 13.17.0
Digium Asterisk 13.2.0
Digium Asterisk 13.3.2
Digium Asterisk 13.0.1
Digium Asterisk 13.10.0
Digium Asterisk 13.6.0
Digium Asterisk 13.0.0
Digium Asterisk 13.11.1
Digium Asterisk 13.13.1
Digium Asterisk 13.11.0
Digium Asterisk 13.9.0
Digium Asterisk 13.12.0
445
VMScore
CVE-2017-14099
In res/res_rtp_asterisk.c in Asterisk 11.x prior to 11.25.2, 13.x prior to 13.17.1, and 14.x prior to 14.6.1 and Certified Asterisk 11.x prior to 11.6-cert17 and 13.x prior to 13.13-cert5, unauthorized data disclosure (media takeover in the RTP stack) is possible with careful tim...
Digium Asterisk 13.1.0
Digium Asterisk 13.2.1
Digium Asterisk 13.8.0
Digium Asterisk 13.15.0
Digium Asterisk 13.7.0
Digium Asterisk 13.7.1
Digium Asterisk 13.12
Digium Asterisk 13.1.1
Digium Asterisk 13.14.0
Digium Asterisk 13.4.0
Digium Asterisk 13.17.0
Digium Asterisk 13.2.0
Digium Asterisk 13.3.2
Digium Asterisk 13.0.1
Digium Asterisk 13.10.0
Digium Asterisk 13.6.0
Digium Asterisk 13.0.0
Digium Asterisk 13.11.1
Digium Asterisk 13.13.1
Digium Asterisk 13.11.0
Digium Asterisk 13.9.0
Digium Asterisk 13.12.0
445
VMScore
CVE-2017-14098
In the pjsip channel driver (res_pjsip) in Asterisk 13.x prior to 13.17.1 and 14.x prior to 14.6.1, a carefully crafted tel URI in a From, To, or Contact header could cause Asterisk to crash.
Digium Asterisk 13.1.0
Digium Asterisk 13.2.1
Digium Asterisk 13.8.0
Digium Asterisk 13.15.0
Digium Asterisk 13.7.0
Digium Asterisk 13.7.1
Digium Asterisk 13.12
Digium Asterisk 13.1.1
Digium Asterisk 13.14.0
Digium Asterisk 13.4.0
Digium Asterisk 13.17.0
Digium Asterisk 13.2.0
Digium Asterisk 13.3.2
Digium Asterisk 13.0.1
Digium Asterisk 13.10.0
Digium Asterisk 13.6.0
Digium Asterisk 13.0.0
Digium Asterisk 13.11.1
Digium Asterisk 13.13.1
Digium Asterisk 13.11.0
Digium Asterisk 13.9.0
Digium Asterisk 13.12.0
445
VMScore
CVE-2016-7551
chain_sip in Asterisk Open Source 11.x prior to 11.23.1 and 13.x 13.11.1 and Certified Asterisk 11.6 prior to 11.6-cert15 and 13.8 prior to 13.8-cert3 allows remote malicious users to cause a denial of service (port exhaustion).
Digium Asterisk 13.1.0
Digium Asterisk 13.2.1
Digium Asterisk 13.8.0
Digium Asterisk 11.14.0
Digium Asterisk 13.7.1
Digium Asterisk 11.2.0
Digium Asterisk 11.21.0
Digium Asterisk 11.22.0
Digium Asterisk 11.10.2
Digium Asterisk 11.0.0
Digium Asterisk 11.1.1
Digium Asterisk 13.1.1
Digium Asterisk 11.21.1
Digium Asterisk 13.4.0
Digium Asterisk 11.10.1
Digium Asterisk 11.16.0
Digium Asterisk 11.11.0
Digium Asterisk 11.12.1
Digium Asterisk 11.23.0
Digium Asterisk 13.2.0
Digium Asterisk 11.0.2
Digium Asterisk 11.18.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »