Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-77r2-q55r-wffw
Summary
Multiple vulnerabilities have been found in Asterisk allowing for Denial of
    Service and username disclosure.
Aliases
0
alias CVE-2008-2119
Fixed_packages
0
url pkg:deb/debian/asterisk@1.4?distro=sid
purl pkg:deb/debian/asterisk@1.4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1.4%3Fdistro=sid
1
url pkg:deb/debian/asterisk@1:1.0.7.dfsg.1-2sarge6
purl pkg:deb/debian/asterisk@1:1.0.7.dfsg.1-2sarge6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1g96-fryn-9qak
3
vulnerability VCID-1qxc-4xk5-2feu
4
vulnerability VCID-1u6r-4dzb-wfh2
5
vulnerability VCID-1wuy-5w5r-bubj
6
vulnerability VCID-2qjc-yspn-xydj
7
vulnerability VCID-2r38-yjx6-uuae
8
vulnerability VCID-32hs-eqw2-1kf2
9
vulnerability VCID-34fv-tv5a-tkgw
10
vulnerability VCID-3gwr-t9bx-47cj
11
vulnerability VCID-3jx3-v6c9-3be2
12
vulnerability VCID-43ff-97jw-hkce
13
vulnerability VCID-48pt-6j6q-jbcn
14
vulnerability VCID-5211-bpr9-nqaf
15
vulnerability VCID-542z-gtvr-ykck
16
vulnerability VCID-5499-3dkq-9fc2
17
vulnerability VCID-55vv-7jsj-xqeh
18
vulnerability VCID-58np-gsxj-8yc4
19
vulnerability VCID-5yue-52xt-ryhw
20
vulnerability VCID-63fe-saga-13ct
21
vulnerability VCID-67av-c7qh-5kek
22
vulnerability VCID-6c2h-e3rr-eyfw
23
vulnerability VCID-6jv8-3wch-wfew
24
vulnerability VCID-6rhm-xrwe-x7af
25
vulnerability VCID-6xqn-t8j4-skgs
26
vulnerability VCID-6yxw-veq3-eqgd
27
vulnerability VCID-7kus-4n4f-myd1
28
vulnerability VCID-7m8s-6ydk-gbgr
29
vulnerability VCID-7ner-5xz7-93gz
30
vulnerability VCID-7pts-41xh-mbh4
31
vulnerability VCID-7pxs-dc7h-tkbs
32
vulnerability VCID-7tfx-9358-gygx
33
vulnerability VCID-7tjs-ybpe-r7hg
34
vulnerability VCID-8kjy-xtm2-bqan
35
vulnerability VCID-8mfb-mmaz-mfab
36
vulnerability VCID-8pdp-epea-juhj
37
vulnerability VCID-8qy8-gk53-eufc
38
vulnerability VCID-8shw-ev6h-dqgh
39
vulnerability VCID-8sys-3sj7-c3h6
40
vulnerability VCID-8yav-jpp1-rfbe
41
vulnerability VCID-917e-7kp2-y3hw
42
vulnerability VCID-986n-21m7-fuc8
43
vulnerability VCID-9at6-bgzv-gue3
44
vulnerability VCID-9f9j-z7y7-sffy
45
vulnerability VCID-9fz9-f74u-2yfe
46
vulnerability VCID-9u4p-wdky-a3h1
47
vulnerability VCID-9w61-sh1p-aqff
48
vulnerability VCID-9xk8-m5c3-wud8
49
vulnerability VCID-a2n5-xpy5-gyfh
50
vulnerability VCID-a442-jcja-zych
51
vulnerability VCID-a5sa-32q2-s3he
52
vulnerability VCID-a8uf-chxy-9udv
53
vulnerability VCID-adsx-448w-vbem
54
vulnerability VCID-ap3n-99gn-aucs
55
vulnerability VCID-apn8-j2e8-uka5
56
vulnerability VCID-ay1n-kp3k-37db
57
vulnerability VCID-b1vq-vecs-pfev
58
vulnerability VCID-b4z5-5hbq-5ka8
59
vulnerability VCID-bbhx-pe8h-fubn
60
vulnerability VCID-bk8r-brkr-bqc6
61
vulnerability VCID-bknu-abgc-bugw
62
vulnerability VCID-bv3b-3h5a-s7ez
63
vulnerability VCID-byqv-c5jp-6ybg
64
vulnerability VCID-c4n3-bd3z-qfbw
65
vulnerability VCID-c765-b3fs-nbdu
66
vulnerability VCID-cupt-538a-z3fp
67
vulnerability VCID-cvp4-5uvw-xff2
68
vulnerability VCID-czy4-hnuj-fbgx
69
vulnerability VCID-d791-zjab-jfh1
70
vulnerability VCID-d8sn-7zbc-4bhy
71
vulnerability VCID-ddpb-zwva-rfc5
72
vulnerability VCID-dmv1-4jgk-e3cq
73
vulnerability VCID-dpra-jbea-4fcy
74
vulnerability VCID-e1yx-dxa6-1bba
75
vulnerability VCID-e3vd-dhyn-1qfa
76
vulnerability VCID-e7t9-pdx7-5kgm
77
vulnerability VCID-ebcm-kjvz-73cz
78
vulnerability VCID-edp8-yh2h-xuck
79
vulnerability VCID-ehd7-39bz-2ybk
80
vulnerability VCID-ehx4-qzgr-qbd9
81
vulnerability VCID-ennr-ek9z-a7db
82
vulnerability VCID-epzp-dpmr-33df
83
vulnerability VCID-eund-5mfa-9kbn
84
vulnerability VCID-f1y5-37zk-x3ey
85
vulnerability VCID-f4br-7sgk-27cf
86
vulnerability VCID-f5qc-tsbr-1yap
87
vulnerability VCID-fdpu-1891-q3a6
88
vulnerability VCID-fjzf-5rtw-rqfj
89
vulnerability VCID-fndq-j9d2-afed
90
vulnerability VCID-fz7z-xttk-13by
91
vulnerability VCID-fzs1-dj22-7fff
92
vulnerability VCID-g6cn-x656-5fcw
93
vulnerability VCID-ggu9-8qd1-4ffx
94
vulnerability VCID-gkcp-1zz6-tfb5
95
vulnerability VCID-grs7-fu68-2ff3
96
vulnerability VCID-gy3u-c6dc-sbbn
97
vulnerability VCID-h193-vjhb-j3a3
98
vulnerability VCID-h52b-ubb6-byh1
99
vulnerability VCID-h8nm-exgj-xybc
100
vulnerability VCID-hj93-7z1r-vkfk
101
vulnerability VCID-huqt-1fv6-67cz
102
vulnerability VCID-hvmt-7qk8-wqh1
103
vulnerability VCID-j3wr-j8e1-tbeq
104
vulnerability VCID-jwaj-b8n5-bbcx
105
vulnerability VCID-k1zu-wpsb-wyh3
106
vulnerability VCID-kby8-5rnd-fffs
107
vulnerability VCID-kdex-mwf6-13br
108
vulnerability VCID-m27d-dqzg-w7gr
109
vulnerability VCID-m3gv-mmcp-t7fz
110
vulnerability VCID-m9wv-atrb-c3ac
111
vulnerability VCID-mcd2-e66p-j3b7
112
vulnerability VCID-mcfv-fuk8-cqaq
113
vulnerability VCID-mmqp-yesh-83c1
114
vulnerability VCID-n6mj-v1nc-hke9
115
vulnerability VCID-nbq8-qr83-qbh7
116
vulnerability VCID-nf5d-nejq-mkd9
117
vulnerability VCID-ngds-k5mh-t3ae
118
vulnerability VCID-nzu7-8h1d-mbbw
119
vulnerability VCID-p5vz-kq6m-63dd
120
vulnerability VCID-p6k6-8gxf-sydp
121
vulnerability VCID-phb4-xaj7-byg2
122
vulnerability VCID-pmte-bc34-pfcv
123
vulnerability VCID-psbg-wv2x-w7ba
124
vulnerability VCID-q6w8-pqsz-7ud4
125
vulnerability VCID-qcqe-63ev-f7gv
126
vulnerability VCID-qksp-5hqu-7qad
127
vulnerability VCID-qpwr-bqps-77cc
128
vulnerability VCID-qsqz-g9fv-6bgg
129
vulnerability VCID-r1sd-avzd-d7gv
130
vulnerability VCID-r6s6-y3q8-vydc
131
vulnerability VCID-r8b9-jcqa-xyb2
132
vulnerability VCID-rb5h-mvxt-7qhv
133
vulnerability VCID-rb9n-t857-1uac
134
vulnerability VCID-re5z-334n-e7a2
135
vulnerability VCID-rn9b-2scp-byf5
136
vulnerability VCID-rwug-45gf-s3bz
137
vulnerability VCID-s3p6-93jg-p7c3
138
vulnerability VCID-s7qt-9z8z-y7bx
139
vulnerability VCID-sb1c-cz2g-dycu
140
vulnerability VCID-sqgd-ykvk-2qay
141
vulnerability VCID-sw4t-1yct-ffbd
142
vulnerability VCID-tekr-xkck-pkfu
143
vulnerability VCID-tqwd-ffwc-mkd1
144
vulnerability VCID-tyh4-14zn-63ez
145
vulnerability VCID-u4gv-ss9p-sqe9
146
vulnerability VCID-u91b-9huy-43hn
147
vulnerability VCID-u99q-b5ug-jyd5
148
vulnerability VCID-u9xx-wevm-ufdh
149
vulnerability VCID-urhv-6gz3-u7fr
150
vulnerability VCID-v7ev-jtsg-cqdg
151
vulnerability VCID-vwf4-v4ve-4yfh
152
vulnerability VCID-w7ce-jd16-xbbs
153
vulnerability VCID-w94b-nwsf-wkg3
154
vulnerability VCID-w9ce-m3x8-n3ak
155
vulnerability VCID-w9e8-ekah-wfg2
156
vulnerability VCID-wfgw-5dme-yfan
157
vulnerability VCID-wsh5-yefr-d7ad
158
vulnerability VCID-wz3z-sq5y-pbd6
159
vulnerability VCID-x2gp-mft6-1yhy
160
vulnerability VCID-xbe4-uvqu-6kf7
161
vulnerability VCID-xqg6-5cn7-4bct
162
vulnerability VCID-xt5z-2sgq-4fc4
163
vulnerability VCID-y3vu-z8tx-tubb
164
vulnerability VCID-y6sx-xqsh-wbcg
165
vulnerability VCID-ytty-tbs1-ffc7
166
vulnerability VCID-yx1m-ayfg-ryc3
167
vulnerability VCID-z3fq-m317-ckb8
168
vulnerability VCID-zabf-adce-sqde
169
vulnerability VCID-zbwp-f5me-jqhu
170
vulnerability VCID-zgqk-kej8-qkhg
171
vulnerability VCID-zkuy-4hqk-vkca
172
vulnerability VCID-zn8s-5jkp-bkbr
173
vulnerability VCID-zr2v-gabj-8kak
174
vulnerability VCID-zvpn-2gds-9yc4
175
vulnerability VCID-zvwt-wp8r-1qhx
176
vulnerability VCID-zxkf-88k3-3qcn
177
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.0.7.dfsg.1-2sarge6
2
url pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
purl pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r54j-ydjm-4uca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid
3
url pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid
4
url pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid
5
url pkg:ebuild/net-misc/asterisk@1.2.32
purl pkg:ebuild/net-misc/asterisk@1.2.32
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@1.2.32
Affected_packages
0
url pkg:deb/debian/asterisk@0.1.11-3
purl pkg:deb/debian/asterisk@0.1.11-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1g96-fryn-9qak
3
vulnerability VCID-1qxc-4xk5-2feu
4
vulnerability VCID-1u6r-4dzb-wfh2
5
vulnerability VCID-1wuy-5w5r-bubj
6
vulnerability VCID-2qjc-yspn-xydj
7
vulnerability VCID-2r38-yjx6-uuae
8
vulnerability VCID-32hs-eqw2-1kf2
9
vulnerability VCID-34fv-tv5a-tkgw
10
vulnerability VCID-3gwr-t9bx-47cj
11
vulnerability VCID-3jx3-v6c9-3be2
12
vulnerability VCID-43ff-97jw-hkce
13
vulnerability VCID-48pt-6j6q-jbcn
14
vulnerability VCID-5211-bpr9-nqaf
15
vulnerability VCID-542z-gtvr-ykck
16
vulnerability VCID-5499-3dkq-9fc2
17
vulnerability VCID-55vv-7jsj-xqeh
18
vulnerability VCID-58np-gsxj-8yc4
19
vulnerability VCID-5yue-52xt-ryhw
20
vulnerability VCID-63fe-saga-13ct
21
vulnerability VCID-67av-c7qh-5kek
22
vulnerability VCID-6c2h-e3rr-eyfw
23
vulnerability VCID-6jv8-3wch-wfew
24
vulnerability VCID-6rhm-xrwe-x7af
25
vulnerability VCID-6xqn-t8j4-skgs
26
vulnerability VCID-6yxw-veq3-eqgd
27
vulnerability VCID-77r2-q55r-wffw
28
vulnerability VCID-7kus-4n4f-myd1
29
vulnerability VCID-7m8s-6ydk-gbgr
30
vulnerability VCID-7ner-5xz7-93gz
31
vulnerability VCID-7pts-41xh-mbh4
32
vulnerability VCID-7pxs-dc7h-tkbs
33
vulnerability VCID-7tfx-9358-gygx
34
vulnerability VCID-7tjs-ybpe-r7hg
35
vulnerability VCID-8kjy-xtm2-bqan
36
vulnerability VCID-8mfb-mmaz-mfab
37
vulnerability VCID-8pdp-epea-juhj
38
vulnerability VCID-8qy8-gk53-eufc
39
vulnerability VCID-8shw-ev6h-dqgh
40
vulnerability VCID-8sys-3sj7-c3h6
41
vulnerability VCID-8yav-jpp1-rfbe
42
vulnerability VCID-917e-7kp2-y3hw
43
vulnerability VCID-986n-21m7-fuc8
44
vulnerability VCID-9at6-bgzv-gue3
45
vulnerability VCID-9f9j-z7y7-sffy
46
vulnerability VCID-9fz9-f74u-2yfe
47
vulnerability VCID-9u4p-wdky-a3h1
48
vulnerability VCID-9w61-sh1p-aqff
49
vulnerability VCID-9xk8-m5c3-wud8
50
vulnerability VCID-a2n5-xpy5-gyfh
51
vulnerability VCID-a442-jcja-zych
52
vulnerability VCID-a5sa-32q2-s3he
53
vulnerability VCID-a8uf-chxy-9udv
54
vulnerability VCID-adsx-448w-vbem
55
vulnerability VCID-ap3n-99gn-aucs
56
vulnerability VCID-apn8-j2e8-uka5
57
vulnerability VCID-ay1n-kp3k-37db
58
vulnerability VCID-b1vq-vecs-pfev
59
vulnerability VCID-b4z5-5hbq-5ka8
60
vulnerability VCID-bbhx-pe8h-fubn
61
vulnerability VCID-bk8r-brkr-bqc6
62
vulnerability VCID-bknu-abgc-bugw
63
vulnerability VCID-bv3b-3h5a-s7ez
64
vulnerability VCID-byqv-c5jp-6ybg
65
vulnerability VCID-c4n3-bd3z-qfbw
66
vulnerability VCID-c765-b3fs-nbdu
67
vulnerability VCID-cupt-538a-z3fp
68
vulnerability VCID-cvp4-5uvw-xff2
69
vulnerability VCID-czy4-hnuj-fbgx
70
vulnerability VCID-d791-zjab-jfh1
71
vulnerability VCID-d8sn-7zbc-4bhy
72
vulnerability VCID-ddpb-zwva-rfc5
73
vulnerability VCID-dmv1-4jgk-e3cq
74
vulnerability VCID-dpra-jbea-4fcy
75
vulnerability VCID-e1yx-dxa6-1bba
76
vulnerability VCID-e3vd-dhyn-1qfa
77
vulnerability VCID-e7t9-pdx7-5kgm
78
vulnerability VCID-ebcm-kjvz-73cz
79
vulnerability VCID-ed6c-6srd-67f6
80
vulnerability VCID-edp8-yh2h-xuck
81
vulnerability VCID-ehd7-39bz-2ybk
82
vulnerability VCID-ehx4-qzgr-qbd9
83
vulnerability VCID-ennr-ek9z-a7db
84
vulnerability VCID-epzp-dpmr-33df
85
vulnerability VCID-eund-5mfa-9kbn
86
vulnerability VCID-f1y5-37zk-x3ey
87
vulnerability VCID-f4br-7sgk-27cf
88
vulnerability VCID-f5qc-tsbr-1yap
89
vulnerability VCID-fdpu-1891-q3a6
90
vulnerability VCID-fjzf-5rtw-rqfj
91
vulnerability VCID-fndq-j9d2-afed
92
vulnerability VCID-fz7z-xttk-13by
93
vulnerability VCID-fzs1-dj22-7fff
94
vulnerability VCID-g6cn-x656-5fcw
95
vulnerability VCID-ggu9-8qd1-4ffx
96
vulnerability VCID-gkcp-1zz6-tfb5
97
vulnerability VCID-grs7-fu68-2ff3
98
vulnerability VCID-gy3u-c6dc-sbbn
99
vulnerability VCID-h193-vjhb-j3a3
100
vulnerability VCID-h52b-ubb6-byh1
101
vulnerability VCID-h8nm-exgj-xybc
102
vulnerability VCID-hj93-7z1r-vkfk
103
vulnerability VCID-huqt-1fv6-67cz
104
vulnerability VCID-hvmt-7qk8-wqh1
105
vulnerability VCID-j3wr-j8e1-tbeq
106
vulnerability VCID-jwaj-b8n5-bbcx
107
vulnerability VCID-k1zu-wpsb-wyh3
108
vulnerability VCID-kby8-5rnd-fffs
109
vulnerability VCID-kdex-mwf6-13br
110
vulnerability VCID-m27d-dqzg-w7gr
111
vulnerability VCID-m3gv-mmcp-t7fz
112
vulnerability VCID-m9wv-atrb-c3ac
113
vulnerability VCID-mcd2-e66p-j3b7
114
vulnerability VCID-mcfv-fuk8-cqaq
115
vulnerability VCID-mmqp-yesh-83c1
116
vulnerability VCID-n6mj-v1nc-hke9
117
vulnerability VCID-nbq8-qr83-qbh7
118
vulnerability VCID-nf5d-nejq-mkd9
119
vulnerability VCID-ngds-k5mh-t3ae
120
vulnerability VCID-nzu7-8h1d-mbbw
121
vulnerability VCID-p5vz-kq6m-63dd
122
vulnerability VCID-p6k6-8gxf-sydp
123
vulnerability VCID-phb4-xaj7-byg2
124
vulnerability VCID-pmte-bc34-pfcv
125
vulnerability VCID-psbg-wv2x-w7ba
126
vulnerability VCID-q6w8-pqsz-7ud4
127
vulnerability VCID-qcqe-63ev-f7gv
128
vulnerability VCID-qksp-5hqu-7qad
129
vulnerability VCID-qpwr-bqps-77cc
130
vulnerability VCID-qsqz-g9fv-6bgg
131
vulnerability VCID-r1sd-avzd-d7gv
132
vulnerability VCID-r6s6-y3q8-vydc
133
vulnerability VCID-r8b9-jcqa-xyb2
134
vulnerability VCID-rb5h-mvxt-7qhv
135
vulnerability VCID-rb9n-t857-1uac
136
vulnerability VCID-re5z-334n-e7a2
137
vulnerability VCID-rn9b-2scp-byf5
138
vulnerability VCID-rwug-45gf-s3bz
139
vulnerability VCID-s3p6-93jg-p7c3
140
vulnerability VCID-s7qt-9z8z-y7bx
141
vulnerability VCID-sb1c-cz2g-dycu
142
vulnerability VCID-sqgd-ykvk-2qay
143
vulnerability VCID-sw4t-1yct-ffbd
144
vulnerability VCID-tekr-xkck-pkfu
145
vulnerability VCID-tqwd-ffwc-mkd1
146
vulnerability VCID-tyh4-14zn-63ez
147
vulnerability VCID-u4gv-ss9p-sqe9
148
vulnerability VCID-u91b-9huy-43hn
149
vulnerability VCID-u99q-b5ug-jyd5
150
vulnerability VCID-u9xx-wevm-ufdh
151
vulnerability VCID-urhv-6gz3-u7fr
152
vulnerability VCID-v7ev-jtsg-cqdg
153
vulnerability VCID-vwf4-v4ve-4yfh
154
vulnerability VCID-w7ce-jd16-xbbs
155
vulnerability VCID-w94b-nwsf-wkg3
156
vulnerability VCID-w9ce-m3x8-n3ak
157
vulnerability VCID-w9e8-ekah-wfg2
158
vulnerability VCID-wfgw-5dme-yfan
159
vulnerability VCID-wsh5-yefr-d7ad
160
vulnerability VCID-wz3z-sq5y-pbd6
161
vulnerability VCID-x2gp-mft6-1yhy
162
vulnerability VCID-xbe4-uvqu-6kf7
163
vulnerability VCID-xqg6-5cn7-4bct
164
vulnerability VCID-xt5z-2sgq-4fc4
165
vulnerability VCID-y3vu-z8tx-tubb
166
vulnerability VCID-y6sx-xqsh-wbcg
167
vulnerability VCID-ytty-tbs1-ffc7
168
vulnerability VCID-yx1m-ayfg-ryc3
169
vulnerability VCID-z3fq-m317-ckb8
170
vulnerability VCID-zabf-adce-sqde
171
vulnerability VCID-zbwp-f5me-jqhu
172
vulnerability VCID-zgqk-kej8-qkhg
173
vulnerability VCID-zkuy-4hqk-vkca
174
vulnerability VCID-zn8s-5jkp-bkbr
175
vulnerability VCID-zr2v-gabj-8kak
176
vulnerability VCID-ztn6-xpxt-vkhb
177
vulnerability VCID-zvpn-2gds-9yc4
178
vulnerability VCID-zvwt-wp8r-1qhx
179
vulnerability VCID-zxkf-88k3-3qcn
180
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0.1.11-3
References
0
reference_url http://bugs.digium.com/view.php?id=12607
reference_id
reference_type
scores
url http://bugs.digium.com/view.php?id=12607
1
reference_url http://downloads.digium.com/pub/security/AST-2008-008.html
reference_id
reference_type
scores
url http://downloads.digium.com/pub/security/AST-2008-008.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2119
reference_id
reference_type
scores
0
value 0.10134
scoring_system epss
scoring_elements 0.93116
published_at 2026-04-16T12:55:00Z
1
value 0.10134
scoring_system epss
scoring_elements 0.93071
published_at 2026-04-01T12:55:00Z
2
value 0.10134
scoring_system epss
scoring_elements 0.93081
published_at 2026-04-02T12:55:00Z
3
value 0.10134
scoring_system epss
scoring_elements 0.93084
published_at 2026-04-04T12:55:00Z
4
value 0.10134
scoring_system epss
scoring_elements 0.93083
published_at 2026-04-07T12:55:00Z
5
value 0.10134
scoring_system epss
scoring_elements 0.93091
published_at 2026-04-08T12:55:00Z
6
value 0.10134
scoring_system epss
scoring_elements 0.93096
published_at 2026-04-09T12:55:00Z
7
value 0.10134
scoring_system epss
scoring_elements 0.93101
published_at 2026-04-11T12:55:00Z
8
value 0.10134
scoring_system epss
scoring_elements 0.93098
published_at 2026-04-12T12:55:00Z
9
value 0.10134
scoring_system epss
scoring_elements 0.931
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2119
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2119
4
reference_url http://secunia.com/advisories/30517
reference_id
reference_type
scores
url http://secunia.com/advisories/30517
5
reference_url http://secunia.com/advisories/34982
reference_id
reference_type
scores
url http://secunia.com/advisories/34982
6
reference_url http://security.gentoo.org/glsa/glsa-200905-01.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200905-01.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/42823
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/42823
8
reference_url http://svn.digium.com/view/asterisk?view=rev&revision=120109
reference_id
reference_type
scores
url http://svn.digium.com/view/asterisk?view=rev&revision=120109
9
reference_url https://www.exploit-db.com/exploits/5749
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/5749
10
reference_url http://www.securityfocus.com/archive/1/493020/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493020/100/0/threaded
11
reference_url http://www.securitytracker.com/id?1020166
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020166
12
reference_url http://www.vupen.com/english/advisories/2008/1731
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1731
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2119
reference_id CVE-2008-2119
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-2119
67
reference_url https://security.gentoo.org/glsa/200905-01
reference_id GLSA-200905-01
reference_type
scores
url https://security.gentoo.org/glsa/200905-01
68
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/5749.pl
reference_id OSVDB-46014;CVE-2008-2119
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/5749.pl
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
0
date_added 2008-06-04
description Asterisk 1.2.x - SIP channel driver / in pedantic mode Remote Crash
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2008-06-05
exploit_type dos
platform multiple
source_date_updated 2016-12-05
data_source Exploit-DB
source_url
Severity_range_score4.3 - 4.3
Exploitability2.0
Weighted_severity3.9
Risk_score7.8
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-77r2-q55r-wffw