Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-7pts-41xh-mbh4
Summary
Multiple vulnerabilities have been found in Asterisk, the worst of
    which may allow execution of arbitrary code.
Aliases
0
alias CVE-2012-4737
Fixed_packages
0
url pkg:deb/debian/asterisk@1:1.8.13.1~dfsg-1?distro=sid
purl pkg:deb/debian/asterisk@1:1.8.13.1~dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.8.13.1~dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/asterisk@1:1.8.13.1~dfsg1-3%2Bdeb7u3
purl pkg:deb/debian/asterisk@1:1.8.13.1~dfsg1-3%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qxc-4xk5-2feu
1
vulnerability VCID-2qjc-yspn-xydj
2
vulnerability VCID-2r38-yjx6-uuae
3
vulnerability VCID-32hs-eqw2-1kf2
4
vulnerability VCID-34fv-tv5a-tkgw
5
vulnerability VCID-3jx3-v6c9-3be2
6
vulnerability VCID-43ff-97jw-hkce
7
vulnerability VCID-48pt-6j6q-jbcn
8
vulnerability VCID-55vv-7jsj-xqeh
9
vulnerability VCID-5yue-52xt-ryhw
10
vulnerability VCID-63fe-saga-13ct
11
vulnerability VCID-6jv8-3wch-wfew
12
vulnerability VCID-6rhm-xrwe-x7af
13
vulnerability VCID-7kus-4n4f-myd1
14
vulnerability VCID-7m8s-6ydk-gbgr
15
vulnerability VCID-7ner-5xz7-93gz
16
vulnerability VCID-7tjs-ybpe-r7hg
17
vulnerability VCID-8kjy-xtm2-bqan
18
vulnerability VCID-8pdp-epea-juhj
19
vulnerability VCID-8qy8-gk53-eufc
20
vulnerability VCID-8shw-ev6h-dqgh
21
vulnerability VCID-8sys-3sj7-c3h6
22
vulnerability VCID-8yav-jpp1-rfbe
23
vulnerability VCID-917e-7kp2-y3hw
24
vulnerability VCID-9at6-bgzv-gue3
25
vulnerability VCID-9f9j-z7y7-sffy
26
vulnerability VCID-9u4p-wdky-a3h1
27
vulnerability VCID-a2n5-xpy5-gyfh
28
vulnerability VCID-ap3n-99gn-aucs
29
vulnerability VCID-ay1n-kp3k-37db
30
vulnerability VCID-b4z5-5hbq-5ka8
31
vulnerability VCID-bbhx-pe8h-fubn
32
vulnerability VCID-bk8r-brkr-bqc6
33
vulnerability VCID-bknu-abgc-bugw
34
vulnerability VCID-byqv-c5jp-6ybg
35
vulnerability VCID-cupt-538a-z3fp
36
vulnerability VCID-ddpb-zwva-rfc5
37
vulnerability VCID-dmv1-4jgk-e3cq
38
vulnerability VCID-dpra-jbea-4fcy
39
vulnerability VCID-e1yx-dxa6-1bba
40
vulnerability VCID-ebcm-kjvz-73cz
41
vulnerability VCID-edp8-yh2h-xuck
42
vulnerability VCID-ehx4-qzgr-qbd9
43
vulnerability VCID-epzp-dpmr-33df
44
vulnerability VCID-eund-5mfa-9kbn
45
vulnerability VCID-f1y5-37zk-x3ey
46
vulnerability VCID-f4br-7sgk-27cf
47
vulnerability VCID-f5qc-tsbr-1yap
48
vulnerability VCID-fjzf-5rtw-rqfj
49
vulnerability VCID-fndq-j9d2-afed
50
vulnerability VCID-fz7z-xttk-13by
51
vulnerability VCID-ggu9-8qd1-4ffx
52
vulnerability VCID-gkcp-1zz6-tfb5
53
vulnerability VCID-gy3u-c6dc-sbbn
54
vulnerability VCID-h193-vjhb-j3a3
55
vulnerability VCID-hj93-7z1r-vkfk
56
vulnerability VCID-huqt-1fv6-67cz
57
vulnerability VCID-hvmt-7qk8-wqh1
58
vulnerability VCID-jwaj-b8n5-bbcx
59
vulnerability VCID-k1zu-wpsb-wyh3
60
vulnerability VCID-m27d-dqzg-w7gr
61
vulnerability VCID-mcfv-fuk8-cqaq
62
vulnerability VCID-n6mj-v1nc-hke9
63
vulnerability VCID-nf5d-nejq-mkd9
64
vulnerability VCID-ngds-k5mh-t3ae
65
vulnerability VCID-p5vz-kq6m-63dd
66
vulnerability VCID-phb4-xaj7-byg2
67
vulnerability VCID-pmte-bc34-pfcv
68
vulnerability VCID-psbg-wv2x-w7ba
69
vulnerability VCID-qcqe-63ev-f7gv
70
vulnerability VCID-qksp-5hqu-7qad
71
vulnerability VCID-r6s6-y3q8-vydc
72
vulnerability VCID-r8b9-jcqa-xyb2
73
vulnerability VCID-rb5h-mvxt-7qhv
74
vulnerability VCID-rwug-45gf-s3bz
75
vulnerability VCID-s3p6-93jg-p7c3
76
vulnerability VCID-sb1c-cz2g-dycu
77
vulnerability VCID-sqgd-ykvk-2qay
78
vulnerability VCID-tqwd-ffwc-mkd1
79
vulnerability VCID-tyh4-14zn-63ez
80
vulnerability VCID-u4gv-ss9p-sqe9
81
vulnerability VCID-u91b-9huy-43hn
82
vulnerability VCID-v7ev-jtsg-cqdg
83
vulnerability VCID-vwf4-v4ve-4yfh
84
vulnerability VCID-w9ce-m3x8-n3ak
85
vulnerability VCID-w9e8-ekah-wfg2
86
vulnerability VCID-x2gp-mft6-1yhy
87
vulnerability VCID-xbe4-uvqu-6kf7
88
vulnerability VCID-y3vu-z8tx-tubb
89
vulnerability VCID-y6sx-xqsh-wbcg
90
vulnerability VCID-ytty-tbs1-ffc7
91
vulnerability VCID-yx1m-ayfg-ryc3
92
vulnerability VCID-z3fq-m317-ckb8
93
vulnerability VCID-zabf-adce-sqde
94
vulnerability VCID-zbwp-f5me-jqhu
95
vulnerability VCID-zvwt-wp8r-1qhx
96
vulnerability VCID-zxkf-88k3-3qcn
97
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.8.13.1~dfsg1-3%252Bdeb7u3
2
url pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
purl pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r54j-ydjm-4uca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid
3
url pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid
4
url pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid
5
url pkg:ebuild/net-misc/asterisk@1.8.15.1
purl pkg:ebuild/net-misc/asterisk@1.8.15.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@1.8.15.1
Affected_packages
0
url pkg:deb/debian/asterisk@0.1.11-3
purl pkg:deb/debian/asterisk@0.1.11-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1g96-fryn-9qak
3
vulnerability VCID-1qxc-4xk5-2feu
4
vulnerability VCID-1u6r-4dzb-wfh2
5
vulnerability VCID-1wuy-5w5r-bubj
6
vulnerability VCID-2qjc-yspn-xydj
7
vulnerability VCID-2r38-yjx6-uuae
8
vulnerability VCID-32hs-eqw2-1kf2
9
vulnerability VCID-34fv-tv5a-tkgw
10
vulnerability VCID-3gwr-t9bx-47cj
11
vulnerability VCID-3jx3-v6c9-3be2
12
vulnerability VCID-43ff-97jw-hkce
13
vulnerability VCID-48pt-6j6q-jbcn
14
vulnerability VCID-5211-bpr9-nqaf
15
vulnerability VCID-542z-gtvr-ykck
16
vulnerability VCID-5499-3dkq-9fc2
17
vulnerability VCID-55vv-7jsj-xqeh
18
vulnerability VCID-58np-gsxj-8yc4
19
vulnerability VCID-5yue-52xt-ryhw
20
vulnerability VCID-63fe-saga-13ct
21
vulnerability VCID-67av-c7qh-5kek
22
vulnerability VCID-6c2h-e3rr-eyfw
23
vulnerability VCID-6jv8-3wch-wfew
24
vulnerability VCID-6rhm-xrwe-x7af
25
vulnerability VCID-6xqn-t8j4-skgs
26
vulnerability VCID-6yxw-veq3-eqgd
27
vulnerability VCID-77r2-q55r-wffw
28
vulnerability VCID-7kus-4n4f-myd1
29
vulnerability VCID-7m8s-6ydk-gbgr
30
vulnerability VCID-7ner-5xz7-93gz
31
vulnerability VCID-7pts-41xh-mbh4
32
vulnerability VCID-7pxs-dc7h-tkbs
33
vulnerability VCID-7tfx-9358-gygx
34
vulnerability VCID-7tjs-ybpe-r7hg
35
vulnerability VCID-8kjy-xtm2-bqan
36
vulnerability VCID-8mfb-mmaz-mfab
37
vulnerability VCID-8pdp-epea-juhj
38
vulnerability VCID-8qy8-gk53-eufc
39
vulnerability VCID-8shw-ev6h-dqgh
40
vulnerability VCID-8sys-3sj7-c3h6
41
vulnerability VCID-8yav-jpp1-rfbe
42
vulnerability VCID-917e-7kp2-y3hw
43
vulnerability VCID-986n-21m7-fuc8
44
vulnerability VCID-9at6-bgzv-gue3
45
vulnerability VCID-9f9j-z7y7-sffy
46
vulnerability VCID-9fz9-f74u-2yfe
47
vulnerability VCID-9u4p-wdky-a3h1
48
vulnerability VCID-9w61-sh1p-aqff
49
vulnerability VCID-9xk8-m5c3-wud8
50
vulnerability VCID-a2n5-xpy5-gyfh
51
vulnerability VCID-a442-jcja-zych
52
vulnerability VCID-a5sa-32q2-s3he
53
vulnerability VCID-a8uf-chxy-9udv
54
vulnerability VCID-adsx-448w-vbem
55
vulnerability VCID-ap3n-99gn-aucs
56
vulnerability VCID-apn8-j2e8-uka5
57
vulnerability VCID-ay1n-kp3k-37db
58
vulnerability VCID-b1vq-vecs-pfev
59
vulnerability VCID-b4z5-5hbq-5ka8
60
vulnerability VCID-bbhx-pe8h-fubn
61
vulnerability VCID-bk8r-brkr-bqc6
62
vulnerability VCID-bknu-abgc-bugw
63
vulnerability VCID-bv3b-3h5a-s7ez
64
vulnerability VCID-byqv-c5jp-6ybg
65
vulnerability VCID-c4n3-bd3z-qfbw
66
vulnerability VCID-c765-b3fs-nbdu
67
vulnerability VCID-cupt-538a-z3fp
68
vulnerability VCID-cvp4-5uvw-xff2
69
vulnerability VCID-czy4-hnuj-fbgx
70
vulnerability VCID-d791-zjab-jfh1
71
vulnerability VCID-d8sn-7zbc-4bhy
72
vulnerability VCID-ddpb-zwva-rfc5
73
vulnerability VCID-dmv1-4jgk-e3cq
74
vulnerability VCID-dpra-jbea-4fcy
75
vulnerability VCID-e1yx-dxa6-1bba
76
vulnerability VCID-e3vd-dhyn-1qfa
77
vulnerability VCID-e7t9-pdx7-5kgm
78
vulnerability VCID-ebcm-kjvz-73cz
79
vulnerability VCID-ed6c-6srd-67f6
80
vulnerability VCID-edp8-yh2h-xuck
81
vulnerability VCID-ehd7-39bz-2ybk
82
vulnerability VCID-ehx4-qzgr-qbd9
83
vulnerability VCID-ennr-ek9z-a7db
84
vulnerability VCID-epzp-dpmr-33df
85
vulnerability VCID-eund-5mfa-9kbn
86
vulnerability VCID-f1y5-37zk-x3ey
87
vulnerability VCID-f4br-7sgk-27cf
88
vulnerability VCID-f5qc-tsbr-1yap
89
vulnerability VCID-fdpu-1891-q3a6
90
vulnerability VCID-fjzf-5rtw-rqfj
91
vulnerability VCID-fndq-j9d2-afed
92
vulnerability VCID-fz7z-xttk-13by
93
vulnerability VCID-fzs1-dj22-7fff
94
vulnerability VCID-g6cn-x656-5fcw
95
vulnerability VCID-ggu9-8qd1-4ffx
96
vulnerability VCID-gkcp-1zz6-tfb5
97
vulnerability VCID-grs7-fu68-2ff3
98
vulnerability VCID-gy3u-c6dc-sbbn
99
vulnerability VCID-h193-vjhb-j3a3
100
vulnerability VCID-h52b-ubb6-byh1
101
vulnerability VCID-h8nm-exgj-xybc
102
vulnerability VCID-hj93-7z1r-vkfk
103
vulnerability VCID-huqt-1fv6-67cz
104
vulnerability VCID-hvmt-7qk8-wqh1
105
vulnerability VCID-j3wr-j8e1-tbeq
106
vulnerability VCID-jwaj-b8n5-bbcx
107
vulnerability VCID-k1zu-wpsb-wyh3
108
vulnerability VCID-kby8-5rnd-fffs
109
vulnerability VCID-kdex-mwf6-13br
110
vulnerability VCID-m27d-dqzg-w7gr
111
vulnerability VCID-m3gv-mmcp-t7fz
112
vulnerability VCID-m9wv-atrb-c3ac
113
vulnerability VCID-mcd2-e66p-j3b7
114
vulnerability VCID-mcfv-fuk8-cqaq
115
vulnerability VCID-mmqp-yesh-83c1
116
vulnerability VCID-n6mj-v1nc-hke9
117
vulnerability VCID-nbq8-qr83-qbh7
118
vulnerability VCID-nf5d-nejq-mkd9
119
vulnerability VCID-ngds-k5mh-t3ae
120
vulnerability VCID-nzu7-8h1d-mbbw
121
vulnerability VCID-p5vz-kq6m-63dd
122
vulnerability VCID-p6k6-8gxf-sydp
123
vulnerability VCID-phb4-xaj7-byg2
124
vulnerability VCID-pmte-bc34-pfcv
125
vulnerability VCID-psbg-wv2x-w7ba
126
vulnerability VCID-q6w8-pqsz-7ud4
127
vulnerability VCID-qcqe-63ev-f7gv
128
vulnerability VCID-qksp-5hqu-7qad
129
vulnerability VCID-qpwr-bqps-77cc
130
vulnerability VCID-qsqz-g9fv-6bgg
131
vulnerability VCID-r1sd-avzd-d7gv
132
vulnerability VCID-r6s6-y3q8-vydc
133
vulnerability VCID-r8b9-jcqa-xyb2
134
vulnerability VCID-rb5h-mvxt-7qhv
135
vulnerability VCID-rb9n-t857-1uac
136
vulnerability VCID-re5z-334n-e7a2
137
vulnerability VCID-rn9b-2scp-byf5
138
vulnerability VCID-rwug-45gf-s3bz
139
vulnerability VCID-s3p6-93jg-p7c3
140
vulnerability VCID-s7qt-9z8z-y7bx
141
vulnerability VCID-sb1c-cz2g-dycu
142
vulnerability VCID-sqgd-ykvk-2qay
143
vulnerability VCID-sw4t-1yct-ffbd
144
vulnerability VCID-tekr-xkck-pkfu
145
vulnerability VCID-tqwd-ffwc-mkd1
146
vulnerability VCID-tyh4-14zn-63ez
147
vulnerability VCID-u4gv-ss9p-sqe9
148
vulnerability VCID-u91b-9huy-43hn
149
vulnerability VCID-u99q-b5ug-jyd5
150
vulnerability VCID-u9xx-wevm-ufdh
151
vulnerability VCID-urhv-6gz3-u7fr
152
vulnerability VCID-v7ev-jtsg-cqdg
153
vulnerability VCID-vwf4-v4ve-4yfh
154
vulnerability VCID-w7ce-jd16-xbbs
155
vulnerability VCID-w94b-nwsf-wkg3
156
vulnerability VCID-w9ce-m3x8-n3ak
157
vulnerability VCID-w9e8-ekah-wfg2
158
vulnerability VCID-wfgw-5dme-yfan
159
vulnerability VCID-wsh5-yefr-d7ad
160
vulnerability VCID-wz3z-sq5y-pbd6
161
vulnerability VCID-x2gp-mft6-1yhy
162
vulnerability VCID-xbe4-uvqu-6kf7
163
vulnerability VCID-xqg6-5cn7-4bct
164
vulnerability VCID-xt5z-2sgq-4fc4
165
vulnerability VCID-y3vu-z8tx-tubb
166
vulnerability VCID-y6sx-xqsh-wbcg
167
vulnerability VCID-ytty-tbs1-ffc7
168
vulnerability VCID-yx1m-ayfg-ryc3
169
vulnerability VCID-z3fq-m317-ckb8
170
vulnerability VCID-zabf-adce-sqde
171
vulnerability VCID-zbwp-f5me-jqhu
172
vulnerability VCID-zgqk-kej8-qkhg
173
vulnerability VCID-zkuy-4hqk-vkca
174
vulnerability VCID-zn8s-5jkp-bkbr
175
vulnerability VCID-zr2v-gabj-8kak
176
vulnerability VCID-ztn6-xpxt-vkhb
177
vulnerability VCID-zvpn-2gds-9yc4
178
vulnerability VCID-zvwt-wp8r-1qhx
179
vulnerability VCID-zxkf-88k3-3qcn
180
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0.1.11-3
1
url pkg:deb/debian/asterisk@1:1.0.7.dfsg.1-2sarge6
purl pkg:deb/debian/asterisk@1:1.0.7.dfsg.1-2sarge6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1g96-fryn-9qak
3
vulnerability VCID-1qxc-4xk5-2feu
4
vulnerability VCID-1u6r-4dzb-wfh2
5
vulnerability VCID-1wuy-5w5r-bubj
6
vulnerability VCID-2qjc-yspn-xydj
7
vulnerability VCID-2r38-yjx6-uuae
8
vulnerability VCID-32hs-eqw2-1kf2
9
vulnerability VCID-34fv-tv5a-tkgw
10
vulnerability VCID-3gwr-t9bx-47cj
11
vulnerability VCID-3jx3-v6c9-3be2
12
vulnerability VCID-43ff-97jw-hkce
13
vulnerability VCID-48pt-6j6q-jbcn
14
vulnerability VCID-5211-bpr9-nqaf
15
vulnerability VCID-542z-gtvr-ykck
16
vulnerability VCID-5499-3dkq-9fc2
17
vulnerability VCID-55vv-7jsj-xqeh
18
vulnerability VCID-58np-gsxj-8yc4
19
vulnerability VCID-5yue-52xt-ryhw
20
vulnerability VCID-63fe-saga-13ct
21
vulnerability VCID-67av-c7qh-5kek
22
vulnerability VCID-6c2h-e3rr-eyfw
23
vulnerability VCID-6jv8-3wch-wfew
24
vulnerability VCID-6rhm-xrwe-x7af
25
vulnerability VCID-6xqn-t8j4-skgs
26
vulnerability VCID-6yxw-veq3-eqgd
27
vulnerability VCID-7kus-4n4f-myd1
28
vulnerability VCID-7m8s-6ydk-gbgr
29
vulnerability VCID-7ner-5xz7-93gz
30
vulnerability VCID-7pts-41xh-mbh4
31
vulnerability VCID-7pxs-dc7h-tkbs
32
vulnerability VCID-7tfx-9358-gygx
33
vulnerability VCID-7tjs-ybpe-r7hg
34
vulnerability VCID-8kjy-xtm2-bqan
35
vulnerability VCID-8mfb-mmaz-mfab
36
vulnerability VCID-8pdp-epea-juhj
37
vulnerability VCID-8qy8-gk53-eufc
38
vulnerability VCID-8shw-ev6h-dqgh
39
vulnerability VCID-8sys-3sj7-c3h6
40
vulnerability VCID-8yav-jpp1-rfbe
41
vulnerability VCID-917e-7kp2-y3hw
42
vulnerability VCID-986n-21m7-fuc8
43
vulnerability VCID-9at6-bgzv-gue3
44
vulnerability VCID-9f9j-z7y7-sffy
45
vulnerability VCID-9fz9-f74u-2yfe
46
vulnerability VCID-9u4p-wdky-a3h1
47
vulnerability VCID-9w61-sh1p-aqff
48
vulnerability VCID-9xk8-m5c3-wud8
49
vulnerability VCID-a2n5-xpy5-gyfh
50
vulnerability VCID-a442-jcja-zych
51
vulnerability VCID-a5sa-32q2-s3he
52
vulnerability VCID-a8uf-chxy-9udv
53
vulnerability VCID-adsx-448w-vbem
54
vulnerability VCID-ap3n-99gn-aucs
55
vulnerability VCID-apn8-j2e8-uka5
56
vulnerability VCID-ay1n-kp3k-37db
57
vulnerability VCID-b1vq-vecs-pfev
58
vulnerability VCID-b4z5-5hbq-5ka8
59
vulnerability VCID-bbhx-pe8h-fubn
60
vulnerability VCID-bk8r-brkr-bqc6
61
vulnerability VCID-bknu-abgc-bugw
62
vulnerability VCID-bv3b-3h5a-s7ez
63
vulnerability VCID-byqv-c5jp-6ybg
64
vulnerability VCID-c4n3-bd3z-qfbw
65
vulnerability VCID-c765-b3fs-nbdu
66
vulnerability VCID-cupt-538a-z3fp
67
vulnerability VCID-cvp4-5uvw-xff2
68
vulnerability VCID-czy4-hnuj-fbgx
69
vulnerability VCID-d791-zjab-jfh1
70
vulnerability VCID-d8sn-7zbc-4bhy
71
vulnerability VCID-ddpb-zwva-rfc5
72
vulnerability VCID-dmv1-4jgk-e3cq
73
vulnerability VCID-dpra-jbea-4fcy
74
vulnerability VCID-e1yx-dxa6-1bba
75
vulnerability VCID-e3vd-dhyn-1qfa
76
vulnerability VCID-e7t9-pdx7-5kgm
77
vulnerability VCID-ebcm-kjvz-73cz
78
vulnerability VCID-edp8-yh2h-xuck
79
vulnerability VCID-ehd7-39bz-2ybk
80
vulnerability VCID-ehx4-qzgr-qbd9
81
vulnerability VCID-ennr-ek9z-a7db
82
vulnerability VCID-epzp-dpmr-33df
83
vulnerability VCID-eund-5mfa-9kbn
84
vulnerability VCID-f1y5-37zk-x3ey
85
vulnerability VCID-f4br-7sgk-27cf
86
vulnerability VCID-f5qc-tsbr-1yap
87
vulnerability VCID-fdpu-1891-q3a6
88
vulnerability VCID-fjzf-5rtw-rqfj
89
vulnerability VCID-fndq-j9d2-afed
90
vulnerability VCID-fz7z-xttk-13by
91
vulnerability VCID-fzs1-dj22-7fff
92
vulnerability VCID-g6cn-x656-5fcw
93
vulnerability VCID-ggu9-8qd1-4ffx
94
vulnerability VCID-gkcp-1zz6-tfb5
95
vulnerability VCID-grs7-fu68-2ff3
96
vulnerability VCID-gy3u-c6dc-sbbn
97
vulnerability VCID-h193-vjhb-j3a3
98
vulnerability VCID-h52b-ubb6-byh1
99
vulnerability VCID-h8nm-exgj-xybc
100
vulnerability VCID-hj93-7z1r-vkfk
101
vulnerability VCID-huqt-1fv6-67cz
102
vulnerability VCID-hvmt-7qk8-wqh1
103
vulnerability VCID-j3wr-j8e1-tbeq
104
vulnerability VCID-jwaj-b8n5-bbcx
105
vulnerability VCID-k1zu-wpsb-wyh3
106
vulnerability VCID-kby8-5rnd-fffs
107
vulnerability VCID-kdex-mwf6-13br
108
vulnerability VCID-m27d-dqzg-w7gr
109
vulnerability VCID-m3gv-mmcp-t7fz
110
vulnerability VCID-m9wv-atrb-c3ac
111
vulnerability VCID-mcd2-e66p-j3b7
112
vulnerability VCID-mcfv-fuk8-cqaq
113
vulnerability VCID-mmqp-yesh-83c1
114
vulnerability VCID-n6mj-v1nc-hke9
115
vulnerability VCID-nbq8-qr83-qbh7
116
vulnerability VCID-nf5d-nejq-mkd9
117
vulnerability VCID-ngds-k5mh-t3ae
118
vulnerability VCID-nzu7-8h1d-mbbw
119
vulnerability VCID-p5vz-kq6m-63dd
120
vulnerability VCID-p6k6-8gxf-sydp
121
vulnerability VCID-phb4-xaj7-byg2
122
vulnerability VCID-pmte-bc34-pfcv
123
vulnerability VCID-psbg-wv2x-w7ba
124
vulnerability VCID-q6w8-pqsz-7ud4
125
vulnerability VCID-qcqe-63ev-f7gv
126
vulnerability VCID-qksp-5hqu-7qad
127
vulnerability VCID-qpwr-bqps-77cc
128
vulnerability VCID-qsqz-g9fv-6bgg
129
vulnerability VCID-r1sd-avzd-d7gv
130
vulnerability VCID-r6s6-y3q8-vydc
131
vulnerability VCID-r8b9-jcqa-xyb2
132
vulnerability VCID-rb5h-mvxt-7qhv
133
vulnerability VCID-rb9n-t857-1uac
134
vulnerability VCID-re5z-334n-e7a2
135
vulnerability VCID-rn9b-2scp-byf5
136
vulnerability VCID-rwug-45gf-s3bz
137
vulnerability VCID-s3p6-93jg-p7c3
138
vulnerability VCID-s7qt-9z8z-y7bx
139
vulnerability VCID-sb1c-cz2g-dycu
140
vulnerability VCID-sqgd-ykvk-2qay
141
vulnerability VCID-sw4t-1yct-ffbd
142
vulnerability VCID-tekr-xkck-pkfu
143
vulnerability VCID-tqwd-ffwc-mkd1
144
vulnerability VCID-tyh4-14zn-63ez
145
vulnerability VCID-u4gv-ss9p-sqe9
146
vulnerability VCID-u91b-9huy-43hn
147
vulnerability VCID-u99q-b5ug-jyd5
148
vulnerability VCID-u9xx-wevm-ufdh
149
vulnerability VCID-urhv-6gz3-u7fr
150
vulnerability VCID-v7ev-jtsg-cqdg
151
vulnerability VCID-vwf4-v4ve-4yfh
152
vulnerability VCID-w7ce-jd16-xbbs
153
vulnerability VCID-w94b-nwsf-wkg3
154
vulnerability VCID-w9ce-m3x8-n3ak
155
vulnerability VCID-w9e8-ekah-wfg2
156
vulnerability VCID-wfgw-5dme-yfan
157
vulnerability VCID-wsh5-yefr-d7ad
158
vulnerability VCID-wz3z-sq5y-pbd6
159
vulnerability VCID-x2gp-mft6-1yhy
160
vulnerability VCID-xbe4-uvqu-6kf7
161
vulnerability VCID-xqg6-5cn7-4bct
162
vulnerability VCID-xt5z-2sgq-4fc4
163
vulnerability VCID-y3vu-z8tx-tubb
164
vulnerability VCID-y6sx-xqsh-wbcg
165
vulnerability VCID-ytty-tbs1-ffc7
166
vulnerability VCID-yx1m-ayfg-ryc3
167
vulnerability VCID-z3fq-m317-ckb8
168
vulnerability VCID-zabf-adce-sqde
169
vulnerability VCID-zbwp-f5me-jqhu
170
vulnerability VCID-zgqk-kej8-qkhg
171
vulnerability VCID-zkuy-4hqk-vkca
172
vulnerability VCID-zn8s-5jkp-bkbr
173
vulnerability VCID-zr2v-gabj-8kak
174
vulnerability VCID-zvpn-2gds-9yc4
175
vulnerability VCID-zvwt-wp8r-1qhx
176
vulnerability VCID-zxkf-88k3-3qcn
177
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.0.7.dfsg.1-2sarge6
2
url pkg:deb/debian/asterisk@1:1.2.13~dfsg-2
purl pkg:deb/debian/asterisk@1:1.2.13~dfsg-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1g96-fryn-9qak
3
vulnerability VCID-1qxc-4xk5-2feu
4
vulnerability VCID-1u6r-4dzb-wfh2
5
vulnerability VCID-1wuy-5w5r-bubj
6
vulnerability VCID-2qjc-yspn-xydj
7
vulnerability VCID-2r38-yjx6-uuae
8
vulnerability VCID-32hs-eqw2-1kf2
9
vulnerability VCID-34fv-tv5a-tkgw
10
vulnerability VCID-3gwr-t9bx-47cj
11
vulnerability VCID-3jx3-v6c9-3be2
12
vulnerability VCID-43ff-97jw-hkce
13
vulnerability VCID-48pt-6j6q-jbcn
14
vulnerability VCID-5211-bpr9-nqaf
15
vulnerability VCID-542z-gtvr-ykck
16
vulnerability VCID-5499-3dkq-9fc2
17
vulnerability VCID-55vv-7jsj-xqeh
18
vulnerability VCID-58np-gsxj-8yc4
19
vulnerability VCID-5yue-52xt-ryhw
20
vulnerability VCID-63fe-saga-13ct
21
vulnerability VCID-67av-c7qh-5kek
22
vulnerability VCID-6jv8-3wch-wfew
23
vulnerability VCID-6rhm-xrwe-x7af
24
vulnerability VCID-6xqn-t8j4-skgs
25
vulnerability VCID-6yxw-veq3-eqgd
26
vulnerability VCID-7kus-4n4f-myd1
27
vulnerability VCID-7m8s-6ydk-gbgr
28
vulnerability VCID-7ner-5xz7-93gz
29
vulnerability VCID-7pts-41xh-mbh4
30
vulnerability VCID-7pxs-dc7h-tkbs
31
vulnerability VCID-7tfx-9358-gygx
32
vulnerability VCID-7tjs-ybpe-r7hg
33
vulnerability VCID-8kjy-xtm2-bqan
34
vulnerability VCID-8mfb-mmaz-mfab
35
vulnerability VCID-8pdp-epea-juhj
36
vulnerability VCID-8qy8-gk53-eufc
37
vulnerability VCID-8shw-ev6h-dqgh
38
vulnerability VCID-8sys-3sj7-c3h6
39
vulnerability VCID-8yav-jpp1-rfbe
40
vulnerability VCID-917e-7kp2-y3hw
41
vulnerability VCID-986n-21m7-fuc8
42
vulnerability VCID-9at6-bgzv-gue3
43
vulnerability VCID-9f9j-z7y7-sffy
44
vulnerability VCID-9u4p-wdky-a3h1
45
vulnerability VCID-9w61-sh1p-aqff
46
vulnerability VCID-9xk8-m5c3-wud8
47
vulnerability VCID-a2n5-xpy5-gyfh
48
vulnerability VCID-a442-jcja-zych
49
vulnerability VCID-a5sa-32q2-s3he
50
vulnerability VCID-a8uf-chxy-9udv
51
vulnerability VCID-adsx-448w-vbem
52
vulnerability VCID-ap3n-99gn-aucs
53
vulnerability VCID-apn8-j2e8-uka5
54
vulnerability VCID-ay1n-kp3k-37db
55
vulnerability VCID-b1vq-vecs-pfev
56
vulnerability VCID-b4z5-5hbq-5ka8
57
vulnerability VCID-bbhx-pe8h-fubn
58
vulnerability VCID-bk8r-brkr-bqc6
59
vulnerability VCID-bknu-abgc-bugw
60
vulnerability VCID-bv3b-3h5a-s7ez
61
vulnerability VCID-byqv-c5jp-6ybg
62
vulnerability VCID-c4n3-bd3z-qfbw
63
vulnerability VCID-c765-b3fs-nbdu
64
vulnerability VCID-cupt-538a-z3fp
65
vulnerability VCID-cvp4-5uvw-xff2
66
vulnerability VCID-czy4-hnuj-fbgx
67
vulnerability VCID-d791-zjab-jfh1
68
vulnerability VCID-d8sn-7zbc-4bhy
69
vulnerability VCID-ddpb-zwva-rfc5
70
vulnerability VCID-dmv1-4jgk-e3cq
71
vulnerability VCID-dpra-jbea-4fcy
72
vulnerability VCID-e1yx-dxa6-1bba
73
vulnerability VCID-e7t9-pdx7-5kgm
74
vulnerability VCID-ebcm-kjvz-73cz
75
vulnerability VCID-edp8-yh2h-xuck
76
vulnerability VCID-ehd7-39bz-2ybk
77
vulnerability VCID-ehx4-qzgr-qbd9
78
vulnerability VCID-ennr-ek9z-a7db
79
vulnerability VCID-epzp-dpmr-33df
80
vulnerability VCID-eund-5mfa-9kbn
81
vulnerability VCID-f1y5-37zk-x3ey
82
vulnerability VCID-f4br-7sgk-27cf
83
vulnerability VCID-f5qc-tsbr-1yap
84
vulnerability VCID-fdpu-1891-q3a6
85
vulnerability VCID-fjzf-5rtw-rqfj
86
vulnerability VCID-fndq-j9d2-afed
87
vulnerability VCID-fz7z-xttk-13by
88
vulnerability VCID-fzs1-dj22-7fff
89
vulnerability VCID-ggu9-8qd1-4ffx
90
vulnerability VCID-gkcp-1zz6-tfb5
91
vulnerability VCID-gy3u-c6dc-sbbn
92
vulnerability VCID-h193-vjhb-j3a3
93
vulnerability VCID-h52b-ubb6-byh1
94
vulnerability VCID-h8nm-exgj-xybc
95
vulnerability VCID-hj93-7z1r-vkfk
96
vulnerability VCID-huqt-1fv6-67cz
97
vulnerability VCID-hvmt-7qk8-wqh1
98
vulnerability VCID-jwaj-b8n5-bbcx
99
vulnerability VCID-k1zu-wpsb-wyh3
100
vulnerability VCID-kby8-5rnd-fffs
101
vulnerability VCID-kdex-mwf6-13br
102
vulnerability VCID-m27d-dqzg-w7gr
103
vulnerability VCID-m3gv-mmcp-t7fz
104
vulnerability VCID-m9wv-atrb-c3ac
105
vulnerability VCID-mcd2-e66p-j3b7
106
vulnerability VCID-mcfv-fuk8-cqaq
107
vulnerability VCID-mmqp-yesh-83c1
108
vulnerability VCID-n6mj-v1nc-hke9
109
vulnerability VCID-nf5d-nejq-mkd9
110
vulnerability VCID-ngds-k5mh-t3ae
111
vulnerability VCID-nzu7-8h1d-mbbw
112
vulnerability VCID-p5vz-kq6m-63dd
113
vulnerability VCID-p6k6-8gxf-sydp
114
vulnerability VCID-phb4-xaj7-byg2
115
vulnerability VCID-pmte-bc34-pfcv
116
vulnerability VCID-psbg-wv2x-w7ba
117
vulnerability VCID-q6w8-pqsz-7ud4
118
vulnerability VCID-qcqe-63ev-f7gv
119
vulnerability VCID-qksp-5hqu-7qad
120
vulnerability VCID-qpwr-bqps-77cc
121
vulnerability VCID-qsqz-g9fv-6bgg
122
vulnerability VCID-r6s6-y3q8-vydc
123
vulnerability VCID-r8b9-jcqa-xyb2
124
vulnerability VCID-rb5h-mvxt-7qhv
125
vulnerability VCID-rb9n-t857-1uac
126
vulnerability VCID-re5z-334n-e7a2
127
vulnerability VCID-rn9b-2scp-byf5
128
vulnerability VCID-rwug-45gf-s3bz
129
vulnerability VCID-s3p6-93jg-p7c3
130
vulnerability VCID-s7qt-9z8z-y7bx
131
vulnerability VCID-sb1c-cz2g-dycu
132
vulnerability VCID-sqgd-ykvk-2qay
133
vulnerability VCID-sw4t-1yct-ffbd
134
vulnerability VCID-tekr-xkck-pkfu
135
vulnerability VCID-tqwd-ffwc-mkd1
136
vulnerability VCID-tyh4-14zn-63ez
137
vulnerability VCID-u4gv-ss9p-sqe9
138
vulnerability VCID-u91b-9huy-43hn
139
vulnerability VCID-u99q-b5ug-jyd5
140
vulnerability VCID-u9xx-wevm-ufdh
141
vulnerability VCID-urhv-6gz3-u7fr
142
vulnerability VCID-v7ev-jtsg-cqdg
143
vulnerability VCID-vwf4-v4ve-4yfh
144
vulnerability VCID-w7ce-jd16-xbbs
145
vulnerability VCID-w94b-nwsf-wkg3
146
vulnerability VCID-w9ce-m3x8-n3ak
147
vulnerability VCID-w9e8-ekah-wfg2
148
vulnerability VCID-wfgw-5dme-yfan
149
vulnerability VCID-wsh5-yefr-d7ad
150
vulnerability VCID-wz3z-sq5y-pbd6
151
vulnerability VCID-x2gp-mft6-1yhy
152
vulnerability VCID-xbe4-uvqu-6kf7
153
vulnerability VCID-xqg6-5cn7-4bct
154
vulnerability VCID-xt5z-2sgq-4fc4
155
vulnerability VCID-y3vu-z8tx-tubb
156
vulnerability VCID-y6sx-xqsh-wbcg
157
vulnerability VCID-ytty-tbs1-ffc7
158
vulnerability VCID-yx1m-ayfg-ryc3
159
vulnerability VCID-z3fq-m317-ckb8
160
vulnerability VCID-zabf-adce-sqde
161
vulnerability VCID-zbwp-f5me-jqhu
162
vulnerability VCID-zgqk-kej8-qkhg
163
vulnerability VCID-zkuy-4hqk-vkca
164
vulnerability VCID-zn8s-5jkp-bkbr
165
vulnerability VCID-zr2v-gabj-8kak
166
vulnerability VCID-zvpn-2gds-9yc4
167
vulnerability VCID-zvwt-wp8r-1qhx
168
vulnerability VCID-zxkf-88k3-3qcn
169
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.2.13~dfsg-2
3
url pkg:deb/debian/asterisk@1:1.2.13~dfsg-2etch4
purl pkg:deb/debian/asterisk@1:1.2.13~dfsg-2etch4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1g96-fryn-9qak
3
vulnerability VCID-1qxc-4xk5-2feu
4
vulnerability VCID-1u6r-4dzb-wfh2
5
vulnerability VCID-1wuy-5w5r-bubj
6
vulnerability VCID-2qjc-yspn-xydj
7
vulnerability VCID-2r38-yjx6-uuae
8
vulnerability VCID-32hs-eqw2-1kf2
9
vulnerability VCID-34fv-tv5a-tkgw
10
vulnerability VCID-3gwr-t9bx-47cj
11
vulnerability VCID-3jx3-v6c9-3be2
12
vulnerability VCID-43ff-97jw-hkce
13
vulnerability VCID-48pt-6j6q-jbcn
14
vulnerability VCID-5211-bpr9-nqaf
15
vulnerability VCID-542z-gtvr-ykck
16
vulnerability VCID-5499-3dkq-9fc2
17
vulnerability VCID-55vv-7jsj-xqeh
18
vulnerability VCID-58np-gsxj-8yc4
19
vulnerability VCID-5yue-52xt-ryhw
20
vulnerability VCID-63fe-saga-13ct
21
vulnerability VCID-67av-c7qh-5kek
22
vulnerability VCID-6jv8-3wch-wfew
23
vulnerability VCID-6rhm-xrwe-x7af
24
vulnerability VCID-6xqn-t8j4-skgs
25
vulnerability VCID-6yxw-veq3-eqgd
26
vulnerability VCID-7kus-4n4f-myd1
27
vulnerability VCID-7m8s-6ydk-gbgr
28
vulnerability VCID-7ner-5xz7-93gz
29
vulnerability VCID-7pts-41xh-mbh4
30
vulnerability VCID-7pxs-dc7h-tkbs
31
vulnerability VCID-7tfx-9358-gygx
32
vulnerability VCID-7tjs-ybpe-r7hg
33
vulnerability VCID-8kjy-xtm2-bqan
34
vulnerability VCID-8mfb-mmaz-mfab
35
vulnerability VCID-8pdp-epea-juhj
36
vulnerability VCID-8qy8-gk53-eufc
37
vulnerability VCID-8shw-ev6h-dqgh
38
vulnerability VCID-8sys-3sj7-c3h6
39
vulnerability VCID-8yav-jpp1-rfbe
40
vulnerability VCID-917e-7kp2-y3hw
41
vulnerability VCID-986n-21m7-fuc8
42
vulnerability VCID-9at6-bgzv-gue3
43
vulnerability VCID-9f9j-z7y7-sffy
44
vulnerability VCID-9u4p-wdky-a3h1
45
vulnerability VCID-9w61-sh1p-aqff
46
vulnerability VCID-9xk8-m5c3-wud8
47
vulnerability VCID-a2n5-xpy5-gyfh
48
vulnerability VCID-a442-jcja-zych
49
vulnerability VCID-a5sa-32q2-s3he
50
vulnerability VCID-a8uf-chxy-9udv
51
vulnerability VCID-adsx-448w-vbem
52
vulnerability VCID-ap3n-99gn-aucs
53
vulnerability VCID-apn8-j2e8-uka5
54
vulnerability VCID-ay1n-kp3k-37db
55
vulnerability VCID-b1vq-vecs-pfev
56
vulnerability VCID-b4z5-5hbq-5ka8
57
vulnerability VCID-bbhx-pe8h-fubn
58
vulnerability VCID-bk8r-brkr-bqc6
59
vulnerability VCID-bknu-abgc-bugw
60
vulnerability VCID-bv3b-3h5a-s7ez
61
vulnerability VCID-byqv-c5jp-6ybg
62
vulnerability VCID-c4n3-bd3z-qfbw
63
vulnerability VCID-c765-b3fs-nbdu
64
vulnerability VCID-cupt-538a-z3fp
65
vulnerability VCID-cvp4-5uvw-xff2
66
vulnerability VCID-czy4-hnuj-fbgx
67
vulnerability VCID-d791-zjab-jfh1
68
vulnerability VCID-d8sn-7zbc-4bhy
69
vulnerability VCID-ddpb-zwva-rfc5
70
vulnerability VCID-dmv1-4jgk-e3cq
71
vulnerability VCID-dpra-jbea-4fcy
72
vulnerability VCID-e1yx-dxa6-1bba
73
vulnerability VCID-e7t9-pdx7-5kgm
74
vulnerability VCID-ebcm-kjvz-73cz
75
vulnerability VCID-edp8-yh2h-xuck
76
vulnerability VCID-ehd7-39bz-2ybk
77
vulnerability VCID-ehx4-qzgr-qbd9
78
vulnerability VCID-ennr-ek9z-a7db
79
vulnerability VCID-epzp-dpmr-33df
80
vulnerability VCID-eund-5mfa-9kbn
81
vulnerability VCID-f1y5-37zk-x3ey
82
vulnerability VCID-f4br-7sgk-27cf
83
vulnerability VCID-f5qc-tsbr-1yap
84
vulnerability VCID-fdpu-1891-q3a6
85
vulnerability VCID-fjzf-5rtw-rqfj
86
vulnerability VCID-fndq-j9d2-afed
87
vulnerability VCID-fz7z-xttk-13by
88
vulnerability VCID-fzs1-dj22-7fff
89
vulnerability VCID-ggu9-8qd1-4ffx
90
vulnerability VCID-gkcp-1zz6-tfb5
91
vulnerability VCID-gy3u-c6dc-sbbn
92
vulnerability VCID-h193-vjhb-j3a3
93
vulnerability VCID-h52b-ubb6-byh1
94
vulnerability VCID-h8nm-exgj-xybc
95
vulnerability VCID-hj93-7z1r-vkfk
96
vulnerability VCID-huqt-1fv6-67cz
97
vulnerability VCID-hvmt-7qk8-wqh1
98
vulnerability VCID-jwaj-b8n5-bbcx
99
vulnerability VCID-k1zu-wpsb-wyh3
100
vulnerability VCID-kby8-5rnd-fffs
101
vulnerability VCID-kdex-mwf6-13br
102
vulnerability VCID-m27d-dqzg-w7gr
103
vulnerability VCID-m3gv-mmcp-t7fz
104
vulnerability VCID-m9wv-atrb-c3ac
105
vulnerability VCID-mcd2-e66p-j3b7
106
vulnerability VCID-mcfv-fuk8-cqaq
107
vulnerability VCID-mmqp-yesh-83c1
108
vulnerability VCID-n6mj-v1nc-hke9
109
vulnerability VCID-nf5d-nejq-mkd9
110
vulnerability VCID-ngds-k5mh-t3ae
111
vulnerability VCID-nzu7-8h1d-mbbw
112
vulnerability VCID-p5vz-kq6m-63dd
113
vulnerability VCID-p6k6-8gxf-sydp
114
vulnerability VCID-phb4-xaj7-byg2
115
vulnerability VCID-pmte-bc34-pfcv
116
vulnerability VCID-psbg-wv2x-w7ba
117
vulnerability VCID-q6w8-pqsz-7ud4
118
vulnerability VCID-qcqe-63ev-f7gv
119
vulnerability VCID-qksp-5hqu-7qad
120
vulnerability VCID-qpwr-bqps-77cc
121
vulnerability VCID-qsqz-g9fv-6bgg
122
vulnerability VCID-r6s6-y3q8-vydc
123
vulnerability VCID-r8b9-jcqa-xyb2
124
vulnerability VCID-rb5h-mvxt-7qhv
125
vulnerability VCID-rb9n-t857-1uac
126
vulnerability VCID-re5z-334n-e7a2
127
vulnerability VCID-rn9b-2scp-byf5
128
vulnerability VCID-rwug-45gf-s3bz
129
vulnerability VCID-s3p6-93jg-p7c3
130
vulnerability VCID-s7qt-9z8z-y7bx
131
vulnerability VCID-sb1c-cz2g-dycu
132
vulnerability VCID-sqgd-ykvk-2qay
133
vulnerability VCID-sw4t-1yct-ffbd
134
vulnerability VCID-tekr-xkck-pkfu
135
vulnerability VCID-tqwd-ffwc-mkd1
136
vulnerability VCID-tyh4-14zn-63ez
137
vulnerability VCID-u4gv-ss9p-sqe9
138
vulnerability VCID-u91b-9huy-43hn
139
vulnerability VCID-u99q-b5ug-jyd5
140
vulnerability VCID-u9xx-wevm-ufdh
141
vulnerability VCID-urhv-6gz3-u7fr
142
vulnerability VCID-v7ev-jtsg-cqdg
143
vulnerability VCID-vwf4-v4ve-4yfh
144
vulnerability VCID-w7ce-jd16-xbbs
145
vulnerability VCID-w94b-nwsf-wkg3
146
vulnerability VCID-w9ce-m3x8-n3ak
147
vulnerability VCID-w9e8-ekah-wfg2
148
vulnerability VCID-wfgw-5dme-yfan
149
vulnerability VCID-wsh5-yefr-d7ad
150
vulnerability VCID-wz3z-sq5y-pbd6
151
vulnerability VCID-x2gp-mft6-1yhy
152
vulnerability VCID-xbe4-uvqu-6kf7
153
vulnerability VCID-xqg6-5cn7-4bct
154
vulnerability VCID-xt5z-2sgq-4fc4
155
vulnerability VCID-y3vu-z8tx-tubb
156
vulnerability VCID-y6sx-xqsh-wbcg
157
vulnerability VCID-ytty-tbs1-ffc7
158
vulnerability VCID-yx1m-ayfg-ryc3
159
vulnerability VCID-z3fq-m317-ckb8
160
vulnerability VCID-zabf-adce-sqde
161
vulnerability VCID-zbwp-f5me-jqhu
162
vulnerability VCID-zgqk-kej8-qkhg
163
vulnerability VCID-zkuy-4hqk-vkca
164
vulnerability VCID-zn8s-5jkp-bkbr
165
vulnerability VCID-zr2v-gabj-8kak
166
vulnerability VCID-zvpn-2gds-9yc4
167
vulnerability VCID-zvwt-wp8r-1qhx
168
vulnerability VCID-zxkf-88k3-3qcn
169
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.2.13~dfsg-2etch4
4
url pkg:deb/debian/asterisk@1:1.4.21.2~dfsg-3%2Blenny6
purl pkg:deb/debian/asterisk@1:1.4.21.2~dfsg-3%2Blenny6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1qxc-4xk5-2feu
3
vulnerability VCID-1u6r-4dzb-wfh2
4
vulnerability VCID-1wuy-5w5r-bubj
5
vulnerability VCID-2qjc-yspn-xydj
6
vulnerability VCID-2r38-yjx6-uuae
7
vulnerability VCID-32hs-eqw2-1kf2
8
vulnerability VCID-34fv-tv5a-tkgw
9
vulnerability VCID-3jx3-v6c9-3be2
10
vulnerability VCID-43ff-97jw-hkce
11
vulnerability VCID-48pt-6j6q-jbcn
12
vulnerability VCID-542z-gtvr-ykck
13
vulnerability VCID-55vv-7jsj-xqeh
14
vulnerability VCID-5yue-52xt-ryhw
15
vulnerability VCID-63fe-saga-13ct
16
vulnerability VCID-67av-c7qh-5kek
17
vulnerability VCID-6jv8-3wch-wfew
18
vulnerability VCID-6rhm-xrwe-x7af
19
vulnerability VCID-6xqn-t8j4-skgs
20
vulnerability VCID-6yxw-veq3-eqgd
21
vulnerability VCID-7kus-4n4f-myd1
22
vulnerability VCID-7m8s-6ydk-gbgr
23
vulnerability VCID-7ner-5xz7-93gz
24
vulnerability VCID-7pts-41xh-mbh4
25
vulnerability VCID-7pxs-dc7h-tkbs
26
vulnerability VCID-7tfx-9358-gygx
27
vulnerability VCID-7tjs-ybpe-r7hg
28
vulnerability VCID-8kjy-xtm2-bqan
29
vulnerability VCID-8mfb-mmaz-mfab
30
vulnerability VCID-8pdp-epea-juhj
31
vulnerability VCID-8qy8-gk53-eufc
32
vulnerability VCID-8shw-ev6h-dqgh
33
vulnerability VCID-8sys-3sj7-c3h6
34
vulnerability VCID-8yav-jpp1-rfbe
35
vulnerability VCID-917e-7kp2-y3hw
36
vulnerability VCID-986n-21m7-fuc8
37
vulnerability VCID-9at6-bgzv-gue3
38
vulnerability VCID-9f9j-z7y7-sffy
39
vulnerability VCID-9u4p-wdky-a3h1
40
vulnerability VCID-9xk8-m5c3-wud8
41
vulnerability VCID-a2n5-xpy5-gyfh
42
vulnerability VCID-ap3n-99gn-aucs
43
vulnerability VCID-apn8-j2e8-uka5
44
vulnerability VCID-ay1n-kp3k-37db
45
vulnerability VCID-b4z5-5hbq-5ka8
46
vulnerability VCID-bbhx-pe8h-fubn
47
vulnerability VCID-bk8r-brkr-bqc6
48
vulnerability VCID-bknu-abgc-bugw
49
vulnerability VCID-bv3b-3h5a-s7ez
50
vulnerability VCID-byqv-c5jp-6ybg
51
vulnerability VCID-c4n3-bd3z-qfbw
52
vulnerability VCID-cupt-538a-z3fp
53
vulnerability VCID-cvp4-5uvw-xff2
54
vulnerability VCID-czy4-hnuj-fbgx
55
vulnerability VCID-d8sn-7zbc-4bhy
56
vulnerability VCID-ddpb-zwva-rfc5
57
vulnerability VCID-dmv1-4jgk-e3cq
58
vulnerability VCID-dpra-jbea-4fcy
59
vulnerability VCID-e1yx-dxa6-1bba
60
vulnerability VCID-e7t9-pdx7-5kgm
61
vulnerability VCID-ebcm-kjvz-73cz
62
vulnerability VCID-edp8-yh2h-xuck
63
vulnerability VCID-ehd7-39bz-2ybk
64
vulnerability VCID-ehx4-qzgr-qbd9
65
vulnerability VCID-ennr-ek9z-a7db
66
vulnerability VCID-epzp-dpmr-33df
67
vulnerability VCID-eund-5mfa-9kbn
68
vulnerability VCID-f1y5-37zk-x3ey
69
vulnerability VCID-f4br-7sgk-27cf
70
vulnerability VCID-f5qc-tsbr-1yap
71
vulnerability VCID-fdpu-1891-q3a6
72
vulnerability VCID-fjzf-5rtw-rqfj
73
vulnerability VCID-fndq-j9d2-afed
74
vulnerability VCID-fz7z-xttk-13by
75
vulnerability VCID-fzs1-dj22-7fff
76
vulnerability VCID-ggu9-8qd1-4ffx
77
vulnerability VCID-gkcp-1zz6-tfb5
78
vulnerability VCID-gy3u-c6dc-sbbn
79
vulnerability VCID-h193-vjhb-j3a3
80
vulnerability VCID-h52b-ubb6-byh1
81
vulnerability VCID-h8nm-exgj-xybc
82
vulnerability VCID-hj93-7z1r-vkfk
83
vulnerability VCID-huqt-1fv6-67cz
84
vulnerability VCID-hvmt-7qk8-wqh1
85
vulnerability VCID-jwaj-b8n5-bbcx
86
vulnerability VCID-k1zu-wpsb-wyh3
87
vulnerability VCID-kdex-mwf6-13br
88
vulnerability VCID-m27d-dqzg-w7gr
89
vulnerability VCID-m3gv-mmcp-t7fz
90
vulnerability VCID-mcfv-fuk8-cqaq
91
vulnerability VCID-mmqp-yesh-83c1
92
vulnerability VCID-n6mj-v1nc-hke9
93
vulnerability VCID-nf5d-nejq-mkd9
94
vulnerability VCID-ngds-k5mh-t3ae
95
vulnerability VCID-nzu7-8h1d-mbbw
96
vulnerability VCID-p5vz-kq6m-63dd
97
vulnerability VCID-phb4-xaj7-byg2
98
vulnerability VCID-pmte-bc34-pfcv
99
vulnerability VCID-psbg-wv2x-w7ba
100
vulnerability VCID-qcqe-63ev-f7gv
101
vulnerability VCID-qksp-5hqu-7qad
102
vulnerability VCID-qpwr-bqps-77cc
103
vulnerability VCID-qsqz-g9fv-6bgg
104
vulnerability VCID-r6s6-y3q8-vydc
105
vulnerability VCID-r8b9-jcqa-xyb2
106
vulnerability VCID-rb5h-mvxt-7qhv
107
vulnerability VCID-rn9b-2scp-byf5
108
vulnerability VCID-rwug-45gf-s3bz
109
vulnerability VCID-s3p6-93jg-p7c3
110
vulnerability VCID-s7qt-9z8z-y7bx
111
vulnerability VCID-sb1c-cz2g-dycu
112
vulnerability VCID-sqgd-ykvk-2qay
113
vulnerability VCID-sw4t-1yct-ffbd
114
vulnerability VCID-tekr-xkck-pkfu
115
vulnerability VCID-tqwd-ffwc-mkd1
116
vulnerability VCID-tyh4-14zn-63ez
117
vulnerability VCID-u4gv-ss9p-sqe9
118
vulnerability VCID-u91b-9huy-43hn
119
vulnerability VCID-u99q-b5ug-jyd5
120
vulnerability VCID-u9xx-wevm-ufdh
121
vulnerability VCID-urhv-6gz3-u7fr
122
vulnerability VCID-v7ev-jtsg-cqdg
123
vulnerability VCID-vwf4-v4ve-4yfh
124
vulnerability VCID-w9ce-m3x8-n3ak
125
vulnerability VCID-w9e8-ekah-wfg2
126
vulnerability VCID-x2gp-mft6-1yhy
127
vulnerability VCID-xbe4-uvqu-6kf7
128
vulnerability VCID-xqg6-5cn7-4bct
129
vulnerability VCID-xt5z-2sgq-4fc4
130
vulnerability VCID-y3vu-z8tx-tubb
131
vulnerability VCID-y6sx-xqsh-wbcg
132
vulnerability VCID-ytty-tbs1-ffc7
133
vulnerability VCID-yx1m-ayfg-ryc3
134
vulnerability VCID-z3fq-m317-ckb8
135
vulnerability VCID-zabf-adce-sqde
136
vulnerability VCID-zbwp-f5me-jqhu
137
vulnerability VCID-zgqk-kej8-qkhg
138
vulnerability VCID-zvpn-2gds-9yc4
139
vulnerability VCID-zvwt-wp8r-1qhx
140
vulnerability VCID-zxkf-88k3-3qcn
141
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.4.21.2~dfsg-3%252Blenny6
5
url pkg:deb/debian/asterisk@1:1.6.2.9-2%2Bsqueeze12
purl pkg:deb/debian/asterisk@1:1.6.2.9-2%2Bsqueeze12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1qxc-4xk5-2feu
2
vulnerability VCID-1u6r-4dzb-wfh2
3
vulnerability VCID-1wuy-5w5r-bubj
4
vulnerability VCID-2qjc-yspn-xydj
5
vulnerability VCID-2r38-yjx6-uuae
6
vulnerability VCID-32hs-eqw2-1kf2
7
vulnerability VCID-34fv-tv5a-tkgw
8
vulnerability VCID-3jx3-v6c9-3be2
9
vulnerability VCID-43ff-97jw-hkce
10
vulnerability VCID-48pt-6j6q-jbcn
11
vulnerability VCID-542z-gtvr-ykck
12
vulnerability VCID-55vv-7jsj-xqeh
13
vulnerability VCID-5yue-52xt-ryhw
14
vulnerability VCID-63fe-saga-13ct
15
vulnerability VCID-67av-c7qh-5kek
16
vulnerability VCID-6jv8-3wch-wfew
17
vulnerability VCID-6rhm-xrwe-x7af
18
vulnerability VCID-6xqn-t8j4-skgs
19
vulnerability VCID-7kus-4n4f-myd1
20
vulnerability VCID-7m8s-6ydk-gbgr
21
vulnerability VCID-7ner-5xz7-93gz
22
vulnerability VCID-7pts-41xh-mbh4
23
vulnerability VCID-7tfx-9358-gygx
24
vulnerability VCID-7tjs-ybpe-r7hg
25
vulnerability VCID-8kjy-xtm2-bqan
26
vulnerability VCID-8mfb-mmaz-mfab
27
vulnerability VCID-8pdp-epea-juhj
28
vulnerability VCID-8qy8-gk53-eufc
29
vulnerability VCID-8shw-ev6h-dqgh
30
vulnerability VCID-8sys-3sj7-c3h6
31
vulnerability VCID-8yav-jpp1-rfbe
32
vulnerability VCID-917e-7kp2-y3hw
33
vulnerability VCID-9at6-bgzv-gue3
34
vulnerability VCID-9f9j-z7y7-sffy
35
vulnerability VCID-9u4p-wdky-a3h1
36
vulnerability VCID-9xk8-m5c3-wud8
37
vulnerability VCID-a2n5-xpy5-gyfh
38
vulnerability VCID-ap3n-99gn-aucs
39
vulnerability VCID-apn8-j2e8-uka5
40
vulnerability VCID-ay1n-kp3k-37db
41
vulnerability VCID-b4z5-5hbq-5ka8
42
vulnerability VCID-bbhx-pe8h-fubn
43
vulnerability VCID-bk8r-brkr-bqc6
44
vulnerability VCID-bknu-abgc-bugw
45
vulnerability VCID-bv3b-3h5a-s7ez
46
vulnerability VCID-byqv-c5jp-6ybg
47
vulnerability VCID-cupt-538a-z3fp
48
vulnerability VCID-cvp4-5uvw-xff2
49
vulnerability VCID-czy4-hnuj-fbgx
50
vulnerability VCID-d8sn-7zbc-4bhy
51
vulnerability VCID-ddpb-zwva-rfc5
52
vulnerability VCID-dmv1-4jgk-e3cq
53
vulnerability VCID-dpra-jbea-4fcy
54
vulnerability VCID-e1yx-dxa6-1bba
55
vulnerability VCID-e7t9-pdx7-5kgm
56
vulnerability VCID-ebcm-kjvz-73cz
57
vulnerability VCID-edp8-yh2h-xuck
58
vulnerability VCID-ehd7-39bz-2ybk
59
vulnerability VCID-ehx4-qzgr-qbd9
60
vulnerability VCID-epzp-dpmr-33df
61
vulnerability VCID-eund-5mfa-9kbn
62
vulnerability VCID-f1y5-37zk-x3ey
63
vulnerability VCID-f4br-7sgk-27cf
64
vulnerability VCID-f5qc-tsbr-1yap
65
vulnerability VCID-fjzf-5rtw-rqfj
66
vulnerability VCID-fndq-j9d2-afed
67
vulnerability VCID-fz7z-xttk-13by
68
vulnerability VCID-ggu9-8qd1-4ffx
69
vulnerability VCID-gkcp-1zz6-tfb5
70
vulnerability VCID-gy3u-c6dc-sbbn
71
vulnerability VCID-h193-vjhb-j3a3
72
vulnerability VCID-h52b-ubb6-byh1
73
vulnerability VCID-hj93-7z1r-vkfk
74
vulnerability VCID-huqt-1fv6-67cz
75
vulnerability VCID-hvmt-7qk8-wqh1
76
vulnerability VCID-jwaj-b8n5-bbcx
77
vulnerability VCID-k1zu-wpsb-wyh3
78
vulnerability VCID-kdex-mwf6-13br
79
vulnerability VCID-m27d-dqzg-w7gr
80
vulnerability VCID-mcfv-fuk8-cqaq
81
vulnerability VCID-mmqp-yesh-83c1
82
vulnerability VCID-n6mj-v1nc-hke9
83
vulnerability VCID-nf5d-nejq-mkd9
84
vulnerability VCID-ngds-k5mh-t3ae
85
vulnerability VCID-nzu7-8h1d-mbbw
86
vulnerability VCID-p5vz-kq6m-63dd
87
vulnerability VCID-phb4-xaj7-byg2
88
vulnerability VCID-pmte-bc34-pfcv
89
vulnerability VCID-psbg-wv2x-w7ba
90
vulnerability VCID-qcqe-63ev-f7gv
91
vulnerability VCID-qksp-5hqu-7qad
92
vulnerability VCID-qpwr-bqps-77cc
93
vulnerability VCID-qsqz-g9fv-6bgg
94
vulnerability VCID-r6s6-y3q8-vydc
95
vulnerability VCID-r8b9-jcqa-xyb2
96
vulnerability VCID-rb5h-mvxt-7qhv
97
vulnerability VCID-rwug-45gf-s3bz
98
vulnerability VCID-s3p6-93jg-p7c3
99
vulnerability VCID-s7qt-9z8z-y7bx
100
vulnerability VCID-sb1c-cz2g-dycu
101
vulnerability VCID-sqgd-ykvk-2qay
102
vulnerability VCID-sw4t-1yct-ffbd
103
vulnerability VCID-tqwd-ffwc-mkd1
104
vulnerability VCID-tyh4-14zn-63ez
105
vulnerability VCID-u4gv-ss9p-sqe9
106
vulnerability VCID-u91b-9huy-43hn
107
vulnerability VCID-u9xx-wevm-ufdh
108
vulnerability VCID-urhv-6gz3-u7fr
109
vulnerability VCID-v7ev-jtsg-cqdg
110
vulnerability VCID-vwf4-v4ve-4yfh
111
vulnerability VCID-w9ce-m3x8-n3ak
112
vulnerability VCID-w9e8-ekah-wfg2
113
vulnerability VCID-x2gp-mft6-1yhy
114
vulnerability VCID-xbe4-uvqu-6kf7
115
vulnerability VCID-xqg6-5cn7-4bct
116
vulnerability VCID-xt5z-2sgq-4fc4
117
vulnerability VCID-y3vu-z8tx-tubb
118
vulnerability VCID-y6sx-xqsh-wbcg
119
vulnerability VCID-ytty-tbs1-ffc7
120
vulnerability VCID-yx1m-ayfg-ryc3
121
vulnerability VCID-z3fq-m317-ckb8
122
vulnerability VCID-zabf-adce-sqde
123
vulnerability VCID-zbwp-f5me-jqhu
124
vulnerability VCID-zgqk-kej8-qkhg
125
vulnerability VCID-zvwt-wp8r-1qhx
126
vulnerability VCID-zxkf-88k3-3qcn
127
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.6.2.9-2%252Bsqueeze12
References
0
reference_url http://downloads.asterisk.org/pub/security/AST-2012-013.html
reference_id
reference_type
scores
url http://downloads.asterisk.org/pub/security/AST-2012-013.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4737
reference_id
reference_type
scores
0
value 0.01504
scoring_system epss
scoring_elements 0.81162
published_at 2026-04-13T12:55:00Z
1
value 0.01504
scoring_system epss
scoring_elements 0.81097
published_at 2026-04-01T12:55:00Z
2
value 0.01504
scoring_system epss
scoring_elements 0.81106
published_at 2026-04-02T12:55:00Z
3
value 0.01504
scoring_system epss
scoring_elements 0.81131
published_at 2026-04-04T12:55:00Z
4
value 0.01504
scoring_system epss
scoring_elements 0.8113
published_at 2026-04-07T12:55:00Z
5
value 0.01504
scoring_system epss
scoring_elements 0.81157
published_at 2026-04-08T12:55:00Z
6
value 0.01504
scoring_system epss
scoring_elements 0.81163
published_at 2026-04-09T12:55:00Z
7
value 0.01504
scoring_system epss
scoring_elements 0.81182
published_at 2026-04-11T12:55:00Z
8
value 0.01504
scoring_system epss
scoring_elements 0.81169
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4737
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4737
3
reference_url http://secunia.com/advisories/50687
reference_id
reference_type
scores
url http://secunia.com/advisories/50687
4
reference_url http://secunia.com/advisories/50756
reference_id
reference_type
scores
url http://secunia.com/advisories/50756
5
reference_url http://www.debian.org/security/2012/dsa-2550
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2550
6
reference_url http://www.securityfocus.com/bid/55335
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55335
7
reference_url http://www.securitytracker.com/id?1027461
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027461
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680470
reference_id 680470
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680470
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.5.2:*:digiumphones:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.5.2:*:digiumphones:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.5.2:*:digiumphones:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.0:*:digiumphones:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.6.0:*:digiumphones:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.0:*:digiumphones:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.6.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.0:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.6.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.0:rc2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.1:*:digiumphones:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.6.1:*:digiumphones:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.6.1:*:digiumphones:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.7.0:*:digiumphones:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.7.0:*:digiumphones:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.7.0:*:digiumphones:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.7.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:10.7.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:10.7.0:rc1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.1.0:-:business:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:c.3.1.0:-:business:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.1.0:-:business:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.1.1:-:business:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:c.3.1.1:-:business:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.1.1:-:business:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.2.2:-:business:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:c.3.2.2:-:business:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.2.2:-:business:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.2.3:-:business:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:c.3.2.3:-:business:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.2.3:-:business:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.3.2:-:business:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:c.3.3.2:-:business:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.3.2:-:business:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.6.2:-:business:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:c.3.6.2:-:business:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.6.2:-:business:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.6.3:-:business:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:c.3.6.3:-:business:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.6.3:-:business:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.6.4:-:business:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:c.3.6.4:-:business:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.6.4:-:business:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.7.5:-:business:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:c.3.7.5:-:business:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.3.7.5:-:business:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert5:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:certified_asterisk:1.8.11:cert5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert5:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert6:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:certified_asterisk:1.8.11:cert6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:1.8.11:cert6:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4737
reference_id CVE-2012-4737
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4737
154
reference_url https://security.gentoo.org/glsa/201209-15
reference_id GLSA-201209-15
reference_type
scores
url https://security.gentoo.org/glsa/201209-15
Weaknesses
0
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
Severity_range_score6.0 - 6.0
Exploitability0.5
Weighted_severity5.4
Risk_score2.7
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-7pts-41xh-mbh4