Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-h52b-ubb6-byh1
Summary
Multiple vulnerabilities have been found in Asterisk, the worst of
    which may allow execution of arbitrary code.
Aliases
0
alias CVE-2013-2686
Fixed_packages
0
url pkg:deb/debian/asterisk@1:1.8.13.1~dfsg-2?distro=sid
purl pkg:deb/debian/asterisk@1:1.8.13.1~dfsg-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.8.13.1~dfsg-2%3Fdistro=sid
1
url pkg:deb/debian/asterisk@1:1.8.13.1~dfsg1-3%2Bdeb7u3
purl pkg:deb/debian/asterisk@1:1.8.13.1~dfsg1-3%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qxc-4xk5-2feu
1
vulnerability VCID-2qjc-yspn-xydj
2
vulnerability VCID-2r38-yjx6-uuae
3
vulnerability VCID-32hs-eqw2-1kf2
4
vulnerability VCID-34fv-tv5a-tkgw
5
vulnerability VCID-3jx3-v6c9-3be2
6
vulnerability VCID-43ff-97jw-hkce
7
vulnerability VCID-48pt-6j6q-jbcn
8
vulnerability VCID-55vv-7jsj-xqeh
9
vulnerability VCID-5yue-52xt-ryhw
10
vulnerability VCID-63fe-saga-13ct
11
vulnerability VCID-6jv8-3wch-wfew
12
vulnerability VCID-6rhm-xrwe-x7af
13
vulnerability VCID-7kus-4n4f-myd1
14
vulnerability VCID-7m8s-6ydk-gbgr
15
vulnerability VCID-7ner-5xz7-93gz
16
vulnerability VCID-7tjs-ybpe-r7hg
17
vulnerability VCID-8kjy-xtm2-bqan
18
vulnerability VCID-8pdp-epea-juhj
19
vulnerability VCID-8qy8-gk53-eufc
20
vulnerability VCID-8shw-ev6h-dqgh
21
vulnerability VCID-8sys-3sj7-c3h6
22
vulnerability VCID-8yav-jpp1-rfbe
23
vulnerability VCID-917e-7kp2-y3hw
24
vulnerability VCID-9at6-bgzv-gue3
25
vulnerability VCID-9f9j-z7y7-sffy
26
vulnerability VCID-9u4p-wdky-a3h1
27
vulnerability VCID-a2n5-xpy5-gyfh
28
vulnerability VCID-ap3n-99gn-aucs
29
vulnerability VCID-ay1n-kp3k-37db
30
vulnerability VCID-b4z5-5hbq-5ka8
31
vulnerability VCID-bbhx-pe8h-fubn
32
vulnerability VCID-bk8r-brkr-bqc6
33
vulnerability VCID-bknu-abgc-bugw
34
vulnerability VCID-byqv-c5jp-6ybg
35
vulnerability VCID-cupt-538a-z3fp
36
vulnerability VCID-ddpb-zwva-rfc5
37
vulnerability VCID-dmv1-4jgk-e3cq
38
vulnerability VCID-dpra-jbea-4fcy
39
vulnerability VCID-e1yx-dxa6-1bba
40
vulnerability VCID-ebcm-kjvz-73cz
41
vulnerability VCID-edp8-yh2h-xuck
42
vulnerability VCID-ehx4-qzgr-qbd9
43
vulnerability VCID-epzp-dpmr-33df
44
vulnerability VCID-eund-5mfa-9kbn
45
vulnerability VCID-f1y5-37zk-x3ey
46
vulnerability VCID-f4br-7sgk-27cf
47
vulnerability VCID-f5qc-tsbr-1yap
48
vulnerability VCID-fjzf-5rtw-rqfj
49
vulnerability VCID-fndq-j9d2-afed
50
vulnerability VCID-fz7z-xttk-13by
51
vulnerability VCID-ggu9-8qd1-4ffx
52
vulnerability VCID-gkcp-1zz6-tfb5
53
vulnerability VCID-gy3u-c6dc-sbbn
54
vulnerability VCID-h193-vjhb-j3a3
55
vulnerability VCID-hj93-7z1r-vkfk
56
vulnerability VCID-huqt-1fv6-67cz
57
vulnerability VCID-hvmt-7qk8-wqh1
58
vulnerability VCID-jwaj-b8n5-bbcx
59
vulnerability VCID-k1zu-wpsb-wyh3
60
vulnerability VCID-m27d-dqzg-w7gr
61
vulnerability VCID-mcfv-fuk8-cqaq
62
vulnerability VCID-n6mj-v1nc-hke9
63
vulnerability VCID-nf5d-nejq-mkd9
64
vulnerability VCID-ngds-k5mh-t3ae
65
vulnerability VCID-p5vz-kq6m-63dd
66
vulnerability VCID-phb4-xaj7-byg2
67
vulnerability VCID-pmte-bc34-pfcv
68
vulnerability VCID-psbg-wv2x-w7ba
69
vulnerability VCID-qcqe-63ev-f7gv
70
vulnerability VCID-qksp-5hqu-7qad
71
vulnerability VCID-r6s6-y3q8-vydc
72
vulnerability VCID-r8b9-jcqa-xyb2
73
vulnerability VCID-rb5h-mvxt-7qhv
74
vulnerability VCID-rwug-45gf-s3bz
75
vulnerability VCID-s3p6-93jg-p7c3
76
vulnerability VCID-sb1c-cz2g-dycu
77
vulnerability VCID-sqgd-ykvk-2qay
78
vulnerability VCID-tqwd-ffwc-mkd1
79
vulnerability VCID-tyh4-14zn-63ez
80
vulnerability VCID-u4gv-ss9p-sqe9
81
vulnerability VCID-u91b-9huy-43hn
82
vulnerability VCID-v7ev-jtsg-cqdg
83
vulnerability VCID-vwf4-v4ve-4yfh
84
vulnerability VCID-w9ce-m3x8-n3ak
85
vulnerability VCID-w9e8-ekah-wfg2
86
vulnerability VCID-x2gp-mft6-1yhy
87
vulnerability VCID-xbe4-uvqu-6kf7
88
vulnerability VCID-y3vu-z8tx-tubb
89
vulnerability VCID-y6sx-xqsh-wbcg
90
vulnerability VCID-ytty-tbs1-ffc7
91
vulnerability VCID-yx1m-ayfg-ryc3
92
vulnerability VCID-z3fq-m317-ckb8
93
vulnerability VCID-zabf-adce-sqde
94
vulnerability VCID-zbwp-f5me-jqhu
95
vulnerability VCID-zvwt-wp8r-1qhx
96
vulnerability VCID-zxkf-88k3-3qcn
97
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.8.13.1~dfsg1-3%252Bdeb7u3
2
url pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
purl pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r54j-ydjm-4uca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid
3
url pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid
4
url pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid
5
url pkg:ebuild/net-misc/asterisk@11.7.0
purl pkg:ebuild/net-misc/asterisk@11.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@11.7.0
Affected_packages
0
url pkg:deb/debian/asterisk@0.1.11-3
purl pkg:deb/debian/asterisk@0.1.11-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1g96-fryn-9qak
3
vulnerability VCID-1qxc-4xk5-2feu
4
vulnerability VCID-1u6r-4dzb-wfh2
5
vulnerability VCID-1wuy-5w5r-bubj
6
vulnerability VCID-2qjc-yspn-xydj
7
vulnerability VCID-2r38-yjx6-uuae
8
vulnerability VCID-32hs-eqw2-1kf2
9
vulnerability VCID-34fv-tv5a-tkgw
10
vulnerability VCID-3gwr-t9bx-47cj
11
vulnerability VCID-3jx3-v6c9-3be2
12
vulnerability VCID-43ff-97jw-hkce
13
vulnerability VCID-48pt-6j6q-jbcn
14
vulnerability VCID-5211-bpr9-nqaf
15
vulnerability VCID-542z-gtvr-ykck
16
vulnerability VCID-5499-3dkq-9fc2
17
vulnerability VCID-55vv-7jsj-xqeh
18
vulnerability VCID-58np-gsxj-8yc4
19
vulnerability VCID-5yue-52xt-ryhw
20
vulnerability VCID-63fe-saga-13ct
21
vulnerability VCID-67av-c7qh-5kek
22
vulnerability VCID-6c2h-e3rr-eyfw
23
vulnerability VCID-6jv8-3wch-wfew
24
vulnerability VCID-6rhm-xrwe-x7af
25
vulnerability VCID-6xqn-t8j4-skgs
26
vulnerability VCID-6yxw-veq3-eqgd
27
vulnerability VCID-77r2-q55r-wffw
28
vulnerability VCID-7kus-4n4f-myd1
29
vulnerability VCID-7m8s-6ydk-gbgr
30
vulnerability VCID-7ner-5xz7-93gz
31
vulnerability VCID-7pts-41xh-mbh4
32
vulnerability VCID-7pxs-dc7h-tkbs
33
vulnerability VCID-7tfx-9358-gygx
34
vulnerability VCID-7tjs-ybpe-r7hg
35
vulnerability VCID-8kjy-xtm2-bqan
36
vulnerability VCID-8mfb-mmaz-mfab
37
vulnerability VCID-8pdp-epea-juhj
38
vulnerability VCID-8qy8-gk53-eufc
39
vulnerability VCID-8shw-ev6h-dqgh
40
vulnerability VCID-8sys-3sj7-c3h6
41
vulnerability VCID-8yav-jpp1-rfbe
42
vulnerability VCID-917e-7kp2-y3hw
43
vulnerability VCID-986n-21m7-fuc8
44
vulnerability VCID-9at6-bgzv-gue3
45
vulnerability VCID-9f9j-z7y7-sffy
46
vulnerability VCID-9fz9-f74u-2yfe
47
vulnerability VCID-9u4p-wdky-a3h1
48
vulnerability VCID-9w61-sh1p-aqff
49
vulnerability VCID-9xk8-m5c3-wud8
50
vulnerability VCID-a2n5-xpy5-gyfh
51
vulnerability VCID-a442-jcja-zych
52
vulnerability VCID-a5sa-32q2-s3he
53
vulnerability VCID-a8uf-chxy-9udv
54
vulnerability VCID-adsx-448w-vbem
55
vulnerability VCID-ap3n-99gn-aucs
56
vulnerability VCID-apn8-j2e8-uka5
57
vulnerability VCID-ay1n-kp3k-37db
58
vulnerability VCID-b1vq-vecs-pfev
59
vulnerability VCID-b4z5-5hbq-5ka8
60
vulnerability VCID-bbhx-pe8h-fubn
61
vulnerability VCID-bk8r-brkr-bqc6
62
vulnerability VCID-bknu-abgc-bugw
63
vulnerability VCID-bv3b-3h5a-s7ez
64
vulnerability VCID-byqv-c5jp-6ybg
65
vulnerability VCID-c4n3-bd3z-qfbw
66
vulnerability VCID-c765-b3fs-nbdu
67
vulnerability VCID-cupt-538a-z3fp
68
vulnerability VCID-cvp4-5uvw-xff2
69
vulnerability VCID-czy4-hnuj-fbgx
70
vulnerability VCID-d791-zjab-jfh1
71
vulnerability VCID-d8sn-7zbc-4bhy
72
vulnerability VCID-ddpb-zwva-rfc5
73
vulnerability VCID-dmv1-4jgk-e3cq
74
vulnerability VCID-dpra-jbea-4fcy
75
vulnerability VCID-e1yx-dxa6-1bba
76
vulnerability VCID-e3vd-dhyn-1qfa
77
vulnerability VCID-e7t9-pdx7-5kgm
78
vulnerability VCID-ebcm-kjvz-73cz
79
vulnerability VCID-ed6c-6srd-67f6
80
vulnerability VCID-edp8-yh2h-xuck
81
vulnerability VCID-ehd7-39bz-2ybk
82
vulnerability VCID-ehx4-qzgr-qbd9
83
vulnerability VCID-ennr-ek9z-a7db
84
vulnerability VCID-epzp-dpmr-33df
85
vulnerability VCID-eund-5mfa-9kbn
86
vulnerability VCID-f1y5-37zk-x3ey
87
vulnerability VCID-f4br-7sgk-27cf
88
vulnerability VCID-f5qc-tsbr-1yap
89
vulnerability VCID-fdpu-1891-q3a6
90
vulnerability VCID-fjzf-5rtw-rqfj
91
vulnerability VCID-fndq-j9d2-afed
92
vulnerability VCID-fz7z-xttk-13by
93
vulnerability VCID-fzs1-dj22-7fff
94
vulnerability VCID-g6cn-x656-5fcw
95
vulnerability VCID-ggu9-8qd1-4ffx
96
vulnerability VCID-gkcp-1zz6-tfb5
97
vulnerability VCID-grs7-fu68-2ff3
98
vulnerability VCID-gy3u-c6dc-sbbn
99
vulnerability VCID-h193-vjhb-j3a3
100
vulnerability VCID-h52b-ubb6-byh1
101
vulnerability VCID-h8nm-exgj-xybc
102
vulnerability VCID-hj93-7z1r-vkfk
103
vulnerability VCID-huqt-1fv6-67cz
104
vulnerability VCID-hvmt-7qk8-wqh1
105
vulnerability VCID-j3wr-j8e1-tbeq
106
vulnerability VCID-jwaj-b8n5-bbcx
107
vulnerability VCID-k1zu-wpsb-wyh3
108
vulnerability VCID-kby8-5rnd-fffs
109
vulnerability VCID-kdex-mwf6-13br
110
vulnerability VCID-m27d-dqzg-w7gr
111
vulnerability VCID-m3gv-mmcp-t7fz
112
vulnerability VCID-m9wv-atrb-c3ac
113
vulnerability VCID-mcd2-e66p-j3b7
114
vulnerability VCID-mcfv-fuk8-cqaq
115
vulnerability VCID-mmqp-yesh-83c1
116
vulnerability VCID-n6mj-v1nc-hke9
117
vulnerability VCID-nbq8-qr83-qbh7
118
vulnerability VCID-nf5d-nejq-mkd9
119
vulnerability VCID-ngds-k5mh-t3ae
120
vulnerability VCID-nzu7-8h1d-mbbw
121
vulnerability VCID-p5vz-kq6m-63dd
122
vulnerability VCID-p6k6-8gxf-sydp
123
vulnerability VCID-phb4-xaj7-byg2
124
vulnerability VCID-pmte-bc34-pfcv
125
vulnerability VCID-psbg-wv2x-w7ba
126
vulnerability VCID-q6w8-pqsz-7ud4
127
vulnerability VCID-qcqe-63ev-f7gv
128
vulnerability VCID-qksp-5hqu-7qad
129
vulnerability VCID-qpwr-bqps-77cc
130
vulnerability VCID-qsqz-g9fv-6bgg
131
vulnerability VCID-r1sd-avzd-d7gv
132
vulnerability VCID-r6s6-y3q8-vydc
133
vulnerability VCID-r8b9-jcqa-xyb2
134
vulnerability VCID-rb5h-mvxt-7qhv
135
vulnerability VCID-rb9n-t857-1uac
136
vulnerability VCID-re5z-334n-e7a2
137
vulnerability VCID-rn9b-2scp-byf5
138
vulnerability VCID-rwug-45gf-s3bz
139
vulnerability VCID-s3p6-93jg-p7c3
140
vulnerability VCID-s7qt-9z8z-y7bx
141
vulnerability VCID-sb1c-cz2g-dycu
142
vulnerability VCID-sqgd-ykvk-2qay
143
vulnerability VCID-sw4t-1yct-ffbd
144
vulnerability VCID-tekr-xkck-pkfu
145
vulnerability VCID-tqwd-ffwc-mkd1
146
vulnerability VCID-tyh4-14zn-63ez
147
vulnerability VCID-u4gv-ss9p-sqe9
148
vulnerability VCID-u91b-9huy-43hn
149
vulnerability VCID-u99q-b5ug-jyd5
150
vulnerability VCID-u9xx-wevm-ufdh
151
vulnerability VCID-urhv-6gz3-u7fr
152
vulnerability VCID-v7ev-jtsg-cqdg
153
vulnerability VCID-vwf4-v4ve-4yfh
154
vulnerability VCID-w7ce-jd16-xbbs
155
vulnerability VCID-w94b-nwsf-wkg3
156
vulnerability VCID-w9ce-m3x8-n3ak
157
vulnerability VCID-w9e8-ekah-wfg2
158
vulnerability VCID-wfgw-5dme-yfan
159
vulnerability VCID-wsh5-yefr-d7ad
160
vulnerability VCID-wz3z-sq5y-pbd6
161
vulnerability VCID-x2gp-mft6-1yhy
162
vulnerability VCID-xbe4-uvqu-6kf7
163
vulnerability VCID-xqg6-5cn7-4bct
164
vulnerability VCID-xt5z-2sgq-4fc4
165
vulnerability VCID-y3vu-z8tx-tubb
166
vulnerability VCID-y6sx-xqsh-wbcg
167
vulnerability VCID-ytty-tbs1-ffc7
168
vulnerability VCID-yx1m-ayfg-ryc3
169
vulnerability VCID-z3fq-m317-ckb8
170
vulnerability VCID-zabf-adce-sqde
171
vulnerability VCID-zbwp-f5me-jqhu
172
vulnerability VCID-zgqk-kej8-qkhg
173
vulnerability VCID-zkuy-4hqk-vkca
174
vulnerability VCID-zn8s-5jkp-bkbr
175
vulnerability VCID-zr2v-gabj-8kak
176
vulnerability VCID-ztn6-xpxt-vkhb
177
vulnerability VCID-zvpn-2gds-9yc4
178
vulnerability VCID-zvwt-wp8r-1qhx
179
vulnerability VCID-zxkf-88k3-3qcn
180
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0.1.11-3
1
url pkg:deb/debian/asterisk@1:1.0.7.dfsg.1-2sarge6
purl pkg:deb/debian/asterisk@1:1.0.7.dfsg.1-2sarge6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1g96-fryn-9qak
3
vulnerability VCID-1qxc-4xk5-2feu
4
vulnerability VCID-1u6r-4dzb-wfh2
5
vulnerability VCID-1wuy-5w5r-bubj
6
vulnerability VCID-2qjc-yspn-xydj
7
vulnerability VCID-2r38-yjx6-uuae
8
vulnerability VCID-32hs-eqw2-1kf2
9
vulnerability VCID-34fv-tv5a-tkgw
10
vulnerability VCID-3gwr-t9bx-47cj
11
vulnerability VCID-3jx3-v6c9-3be2
12
vulnerability VCID-43ff-97jw-hkce
13
vulnerability VCID-48pt-6j6q-jbcn
14
vulnerability VCID-5211-bpr9-nqaf
15
vulnerability VCID-542z-gtvr-ykck
16
vulnerability VCID-5499-3dkq-9fc2
17
vulnerability VCID-55vv-7jsj-xqeh
18
vulnerability VCID-58np-gsxj-8yc4
19
vulnerability VCID-5yue-52xt-ryhw
20
vulnerability VCID-63fe-saga-13ct
21
vulnerability VCID-67av-c7qh-5kek
22
vulnerability VCID-6c2h-e3rr-eyfw
23
vulnerability VCID-6jv8-3wch-wfew
24
vulnerability VCID-6rhm-xrwe-x7af
25
vulnerability VCID-6xqn-t8j4-skgs
26
vulnerability VCID-6yxw-veq3-eqgd
27
vulnerability VCID-7kus-4n4f-myd1
28
vulnerability VCID-7m8s-6ydk-gbgr
29
vulnerability VCID-7ner-5xz7-93gz
30
vulnerability VCID-7pts-41xh-mbh4
31
vulnerability VCID-7pxs-dc7h-tkbs
32
vulnerability VCID-7tfx-9358-gygx
33
vulnerability VCID-7tjs-ybpe-r7hg
34
vulnerability VCID-8kjy-xtm2-bqan
35
vulnerability VCID-8mfb-mmaz-mfab
36
vulnerability VCID-8pdp-epea-juhj
37
vulnerability VCID-8qy8-gk53-eufc
38
vulnerability VCID-8shw-ev6h-dqgh
39
vulnerability VCID-8sys-3sj7-c3h6
40
vulnerability VCID-8yav-jpp1-rfbe
41
vulnerability VCID-917e-7kp2-y3hw
42
vulnerability VCID-986n-21m7-fuc8
43
vulnerability VCID-9at6-bgzv-gue3
44
vulnerability VCID-9f9j-z7y7-sffy
45
vulnerability VCID-9fz9-f74u-2yfe
46
vulnerability VCID-9u4p-wdky-a3h1
47
vulnerability VCID-9w61-sh1p-aqff
48
vulnerability VCID-9xk8-m5c3-wud8
49
vulnerability VCID-a2n5-xpy5-gyfh
50
vulnerability VCID-a442-jcja-zych
51
vulnerability VCID-a5sa-32q2-s3he
52
vulnerability VCID-a8uf-chxy-9udv
53
vulnerability VCID-adsx-448w-vbem
54
vulnerability VCID-ap3n-99gn-aucs
55
vulnerability VCID-apn8-j2e8-uka5
56
vulnerability VCID-ay1n-kp3k-37db
57
vulnerability VCID-b1vq-vecs-pfev
58
vulnerability VCID-b4z5-5hbq-5ka8
59
vulnerability VCID-bbhx-pe8h-fubn
60
vulnerability VCID-bk8r-brkr-bqc6
61
vulnerability VCID-bknu-abgc-bugw
62
vulnerability VCID-bv3b-3h5a-s7ez
63
vulnerability VCID-byqv-c5jp-6ybg
64
vulnerability VCID-c4n3-bd3z-qfbw
65
vulnerability VCID-c765-b3fs-nbdu
66
vulnerability VCID-cupt-538a-z3fp
67
vulnerability VCID-cvp4-5uvw-xff2
68
vulnerability VCID-czy4-hnuj-fbgx
69
vulnerability VCID-d791-zjab-jfh1
70
vulnerability VCID-d8sn-7zbc-4bhy
71
vulnerability VCID-ddpb-zwva-rfc5
72
vulnerability VCID-dmv1-4jgk-e3cq
73
vulnerability VCID-dpra-jbea-4fcy
74
vulnerability VCID-e1yx-dxa6-1bba
75
vulnerability VCID-e3vd-dhyn-1qfa
76
vulnerability VCID-e7t9-pdx7-5kgm
77
vulnerability VCID-ebcm-kjvz-73cz
78
vulnerability VCID-edp8-yh2h-xuck
79
vulnerability VCID-ehd7-39bz-2ybk
80
vulnerability VCID-ehx4-qzgr-qbd9
81
vulnerability VCID-ennr-ek9z-a7db
82
vulnerability VCID-epzp-dpmr-33df
83
vulnerability VCID-eund-5mfa-9kbn
84
vulnerability VCID-f1y5-37zk-x3ey
85
vulnerability VCID-f4br-7sgk-27cf
86
vulnerability VCID-f5qc-tsbr-1yap
87
vulnerability VCID-fdpu-1891-q3a6
88
vulnerability VCID-fjzf-5rtw-rqfj
89
vulnerability VCID-fndq-j9d2-afed
90
vulnerability VCID-fz7z-xttk-13by
91
vulnerability VCID-fzs1-dj22-7fff
92
vulnerability VCID-g6cn-x656-5fcw
93
vulnerability VCID-ggu9-8qd1-4ffx
94
vulnerability VCID-gkcp-1zz6-tfb5
95
vulnerability VCID-grs7-fu68-2ff3
96
vulnerability VCID-gy3u-c6dc-sbbn
97
vulnerability VCID-h193-vjhb-j3a3
98
vulnerability VCID-h52b-ubb6-byh1
99
vulnerability VCID-h8nm-exgj-xybc
100
vulnerability VCID-hj93-7z1r-vkfk
101
vulnerability VCID-huqt-1fv6-67cz
102
vulnerability VCID-hvmt-7qk8-wqh1
103
vulnerability VCID-j3wr-j8e1-tbeq
104
vulnerability VCID-jwaj-b8n5-bbcx
105
vulnerability VCID-k1zu-wpsb-wyh3
106
vulnerability VCID-kby8-5rnd-fffs
107
vulnerability VCID-kdex-mwf6-13br
108
vulnerability VCID-m27d-dqzg-w7gr
109
vulnerability VCID-m3gv-mmcp-t7fz
110
vulnerability VCID-m9wv-atrb-c3ac
111
vulnerability VCID-mcd2-e66p-j3b7
112
vulnerability VCID-mcfv-fuk8-cqaq
113
vulnerability VCID-mmqp-yesh-83c1
114
vulnerability VCID-n6mj-v1nc-hke9
115
vulnerability VCID-nbq8-qr83-qbh7
116
vulnerability VCID-nf5d-nejq-mkd9
117
vulnerability VCID-ngds-k5mh-t3ae
118
vulnerability VCID-nzu7-8h1d-mbbw
119
vulnerability VCID-p5vz-kq6m-63dd
120
vulnerability VCID-p6k6-8gxf-sydp
121
vulnerability VCID-phb4-xaj7-byg2
122
vulnerability VCID-pmte-bc34-pfcv
123
vulnerability VCID-psbg-wv2x-w7ba
124
vulnerability VCID-q6w8-pqsz-7ud4
125
vulnerability VCID-qcqe-63ev-f7gv
126
vulnerability VCID-qksp-5hqu-7qad
127
vulnerability VCID-qpwr-bqps-77cc
128
vulnerability VCID-qsqz-g9fv-6bgg
129
vulnerability VCID-r1sd-avzd-d7gv
130
vulnerability VCID-r6s6-y3q8-vydc
131
vulnerability VCID-r8b9-jcqa-xyb2
132
vulnerability VCID-rb5h-mvxt-7qhv
133
vulnerability VCID-rb9n-t857-1uac
134
vulnerability VCID-re5z-334n-e7a2
135
vulnerability VCID-rn9b-2scp-byf5
136
vulnerability VCID-rwug-45gf-s3bz
137
vulnerability VCID-s3p6-93jg-p7c3
138
vulnerability VCID-s7qt-9z8z-y7bx
139
vulnerability VCID-sb1c-cz2g-dycu
140
vulnerability VCID-sqgd-ykvk-2qay
141
vulnerability VCID-sw4t-1yct-ffbd
142
vulnerability VCID-tekr-xkck-pkfu
143
vulnerability VCID-tqwd-ffwc-mkd1
144
vulnerability VCID-tyh4-14zn-63ez
145
vulnerability VCID-u4gv-ss9p-sqe9
146
vulnerability VCID-u91b-9huy-43hn
147
vulnerability VCID-u99q-b5ug-jyd5
148
vulnerability VCID-u9xx-wevm-ufdh
149
vulnerability VCID-urhv-6gz3-u7fr
150
vulnerability VCID-v7ev-jtsg-cqdg
151
vulnerability VCID-vwf4-v4ve-4yfh
152
vulnerability VCID-w7ce-jd16-xbbs
153
vulnerability VCID-w94b-nwsf-wkg3
154
vulnerability VCID-w9ce-m3x8-n3ak
155
vulnerability VCID-w9e8-ekah-wfg2
156
vulnerability VCID-wfgw-5dme-yfan
157
vulnerability VCID-wsh5-yefr-d7ad
158
vulnerability VCID-wz3z-sq5y-pbd6
159
vulnerability VCID-x2gp-mft6-1yhy
160
vulnerability VCID-xbe4-uvqu-6kf7
161
vulnerability VCID-xqg6-5cn7-4bct
162
vulnerability VCID-xt5z-2sgq-4fc4
163
vulnerability VCID-y3vu-z8tx-tubb
164
vulnerability VCID-y6sx-xqsh-wbcg
165
vulnerability VCID-ytty-tbs1-ffc7
166
vulnerability VCID-yx1m-ayfg-ryc3
167
vulnerability VCID-z3fq-m317-ckb8
168
vulnerability VCID-zabf-adce-sqde
169
vulnerability VCID-zbwp-f5me-jqhu
170
vulnerability VCID-zgqk-kej8-qkhg
171
vulnerability VCID-zkuy-4hqk-vkca
172
vulnerability VCID-zn8s-5jkp-bkbr
173
vulnerability VCID-zr2v-gabj-8kak
174
vulnerability VCID-zvpn-2gds-9yc4
175
vulnerability VCID-zvwt-wp8r-1qhx
176
vulnerability VCID-zxkf-88k3-3qcn
177
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.0.7.dfsg.1-2sarge6
2
url pkg:deb/debian/asterisk@1:1.2.13~dfsg-2
purl pkg:deb/debian/asterisk@1:1.2.13~dfsg-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1g96-fryn-9qak
3
vulnerability VCID-1qxc-4xk5-2feu
4
vulnerability VCID-1u6r-4dzb-wfh2
5
vulnerability VCID-1wuy-5w5r-bubj
6
vulnerability VCID-2qjc-yspn-xydj
7
vulnerability VCID-2r38-yjx6-uuae
8
vulnerability VCID-32hs-eqw2-1kf2
9
vulnerability VCID-34fv-tv5a-tkgw
10
vulnerability VCID-3gwr-t9bx-47cj
11
vulnerability VCID-3jx3-v6c9-3be2
12
vulnerability VCID-43ff-97jw-hkce
13
vulnerability VCID-48pt-6j6q-jbcn
14
vulnerability VCID-5211-bpr9-nqaf
15
vulnerability VCID-542z-gtvr-ykck
16
vulnerability VCID-5499-3dkq-9fc2
17
vulnerability VCID-55vv-7jsj-xqeh
18
vulnerability VCID-58np-gsxj-8yc4
19
vulnerability VCID-5yue-52xt-ryhw
20
vulnerability VCID-63fe-saga-13ct
21
vulnerability VCID-67av-c7qh-5kek
22
vulnerability VCID-6jv8-3wch-wfew
23
vulnerability VCID-6rhm-xrwe-x7af
24
vulnerability VCID-6xqn-t8j4-skgs
25
vulnerability VCID-6yxw-veq3-eqgd
26
vulnerability VCID-7kus-4n4f-myd1
27
vulnerability VCID-7m8s-6ydk-gbgr
28
vulnerability VCID-7ner-5xz7-93gz
29
vulnerability VCID-7pts-41xh-mbh4
30
vulnerability VCID-7pxs-dc7h-tkbs
31
vulnerability VCID-7tfx-9358-gygx
32
vulnerability VCID-7tjs-ybpe-r7hg
33
vulnerability VCID-8kjy-xtm2-bqan
34
vulnerability VCID-8mfb-mmaz-mfab
35
vulnerability VCID-8pdp-epea-juhj
36
vulnerability VCID-8qy8-gk53-eufc
37
vulnerability VCID-8shw-ev6h-dqgh
38
vulnerability VCID-8sys-3sj7-c3h6
39
vulnerability VCID-8yav-jpp1-rfbe
40
vulnerability VCID-917e-7kp2-y3hw
41
vulnerability VCID-986n-21m7-fuc8
42
vulnerability VCID-9at6-bgzv-gue3
43
vulnerability VCID-9f9j-z7y7-sffy
44
vulnerability VCID-9u4p-wdky-a3h1
45
vulnerability VCID-9w61-sh1p-aqff
46
vulnerability VCID-9xk8-m5c3-wud8
47
vulnerability VCID-a2n5-xpy5-gyfh
48
vulnerability VCID-a442-jcja-zych
49
vulnerability VCID-a5sa-32q2-s3he
50
vulnerability VCID-a8uf-chxy-9udv
51
vulnerability VCID-adsx-448w-vbem
52
vulnerability VCID-ap3n-99gn-aucs
53
vulnerability VCID-apn8-j2e8-uka5
54
vulnerability VCID-ay1n-kp3k-37db
55
vulnerability VCID-b1vq-vecs-pfev
56
vulnerability VCID-b4z5-5hbq-5ka8
57
vulnerability VCID-bbhx-pe8h-fubn
58
vulnerability VCID-bk8r-brkr-bqc6
59
vulnerability VCID-bknu-abgc-bugw
60
vulnerability VCID-bv3b-3h5a-s7ez
61
vulnerability VCID-byqv-c5jp-6ybg
62
vulnerability VCID-c4n3-bd3z-qfbw
63
vulnerability VCID-c765-b3fs-nbdu
64
vulnerability VCID-cupt-538a-z3fp
65
vulnerability VCID-cvp4-5uvw-xff2
66
vulnerability VCID-czy4-hnuj-fbgx
67
vulnerability VCID-d791-zjab-jfh1
68
vulnerability VCID-d8sn-7zbc-4bhy
69
vulnerability VCID-ddpb-zwva-rfc5
70
vulnerability VCID-dmv1-4jgk-e3cq
71
vulnerability VCID-dpra-jbea-4fcy
72
vulnerability VCID-e1yx-dxa6-1bba
73
vulnerability VCID-e7t9-pdx7-5kgm
74
vulnerability VCID-ebcm-kjvz-73cz
75
vulnerability VCID-edp8-yh2h-xuck
76
vulnerability VCID-ehd7-39bz-2ybk
77
vulnerability VCID-ehx4-qzgr-qbd9
78
vulnerability VCID-ennr-ek9z-a7db
79
vulnerability VCID-epzp-dpmr-33df
80
vulnerability VCID-eund-5mfa-9kbn
81
vulnerability VCID-f1y5-37zk-x3ey
82
vulnerability VCID-f4br-7sgk-27cf
83
vulnerability VCID-f5qc-tsbr-1yap
84
vulnerability VCID-fdpu-1891-q3a6
85
vulnerability VCID-fjzf-5rtw-rqfj
86
vulnerability VCID-fndq-j9d2-afed
87
vulnerability VCID-fz7z-xttk-13by
88
vulnerability VCID-fzs1-dj22-7fff
89
vulnerability VCID-ggu9-8qd1-4ffx
90
vulnerability VCID-gkcp-1zz6-tfb5
91
vulnerability VCID-gy3u-c6dc-sbbn
92
vulnerability VCID-h193-vjhb-j3a3
93
vulnerability VCID-h52b-ubb6-byh1
94
vulnerability VCID-h8nm-exgj-xybc
95
vulnerability VCID-hj93-7z1r-vkfk
96
vulnerability VCID-huqt-1fv6-67cz
97
vulnerability VCID-hvmt-7qk8-wqh1
98
vulnerability VCID-jwaj-b8n5-bbcx
99
vulnerability VCID-k1zu-wpsb-wyh3
100
vulnerability VCID-kby8-5rnd-fffs
101
vulnerability VCID-kdex-mwf6-13br
102
vulnerability VCID-m27d-dqzg-w7gr
103
vulnerability VCID-m3gv-mmcp-t7fz
104
vulnerability VCID-m9wv-atrb-c3ac
105
vulnerability VCID-mcd2-e66p-j3b7
106
vulnerability VCID-mcfv-fuk8-cqaq
107
vulnerability VCID-mmqp-yesh-83c1
108
vulnerability VCID-n6mj-v1nc-hke9
109
vulnerability VCID-nf5d-nejq-mkd9
110
vulnerability VCID-ngds-k5mh-t3ae
111
vulnerability VCID-nzu7-8h1d-mbbw
112
vulnerability VCID-p5vz-kq6m-63dd
113
vulnerability VCID-p6k6-8gxf-sydp
114
vulnerability VCID-phb4-xaj7-byg2
115
vulnerability VCID-pmte-bc34-pfcv
116
vulnerability VCID-psbg-wv2x-w7ba
117
vulnerability VCID-q6w8-pqsz-7ud4
118
vulnerability VCID-qcqe-63ev-f7gv
119
vulnerability VCID-qksp-5hqu-7qad
120
vulnerability VCID-qpwr-bqps-77cc
121
vulnerability VCID-qsqz-g9fv-6bgg
122
vulnerability VCID-r6s6-y3q8-vydc
123
vulnerability VCID-r8b9-jcqa-xyb2
124
vulnerability VCID-rb5h-mvxt-7qhv
125
vulnerability VCID-rb9n-t857-1uac
126
vulnerability VCID-re5z-334n-e7a2
127
vulnerability VCID-rn9b-2scp-byf5
128
vulnerability VCID-rwug-45gf-s3bz
129
vulnerability VCID-s3p6-93jg-p7c3
130
vulnerability VCID-s7qt-9z8z-y7bx
131
vulnerability VCID-sb1c-cz2g-dycu
132
vulnerability VCID-sqgd-ykvk-2qay
133
vulnerability VCID-sw4t-1yct-ffbd
134
vulnerability VCID-tekr-xkck-pkfu
135
vulnerability VCID-tqwd-ffwc-mkd1
136
vulnerability VCID-tyh4-14zn-63ez
137
vulnerability VCID-u4gv-ss9p-sqe9
138
vulnerability VCID-u91b-9huy-43hn
139
vulnerability VCID-u99q-b5ug-jyd5
140
vulnerability VCID-u9xx-wevm-ufdh
141
vulnerability VCID-urhv-6gz3-u7fr
142
vulnerability VCID-v7ev-jtsg-cqdg
143
vulnerability VCID-vwf4-v4ve-4yfh
144
vulnerability VCID-w7ce-jd16-xbbs
145
vulnerability VCID-w94b-nwsf-wkg3
146
vulnerability VCID-w9ce-m3x8-n3ak
147
vulnerability VCID-w9e8-ekah-wfg2
148
vulnerability VCID-wfgw-5dme-yfan
149
vulnerability VCID-wsh5-yefr-d7ad
150
vulnerability VCID-wz3z-sq5y-pbd6
151
vulnerability VCID-x2gp-mft6-1yhy
152
vulnerability VCID-xbe4-uvqu-6kf7
153
vulnerability VCID-xqg6-5cn7-4bct
154
vulnerability VCID-xt5z-2sgq-4fc4
155
vulnerability VCID-y3vu-z8tx-tubb
156
vulnerability VCID-y6sx-xqsh-wbcg
157
vulnerability VCID-ytty-tbs1-ffc7
158
vulnerability VCID-yx1m-ayfg-ryc3
159
vulnerability VCID-z3fq-m317-ckb8
160
vulnerability VCID-zabf-adce-sqde
161
vulnerability VCID-zbwp-f5me-jqhu
162
vulnerability VCID-zgqk-kej8-qkhg
163
vulnerability VCID-zkuy-4hqk-vkca
164
vulnerability VCID-zn8s-5jkp-bkbr
165
vulnerability VCID-zr2v-gabj-8kak
166
vulnerability VCID-zvpn-2gds-9yc4
167
vulnerability VCID-zvwt-wp8r-1qhx
168
vulnerability VCID-zxkf-88k3-3qcn
169
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.2.13~dfsg-2
3
url pkg:deb/debian/asterisk@1:1.2.13~dfsg-2etch4
purl pkg:deb/debian/asterisk@1:1.2.13~dfsg-2etch4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1g96-fryn-9qak
3
vulnerability VCID-1qxc-4xk5-2feu
4
vulnerability VCID-1u6r-4dzb-wfh2
5
vulnerability VCID-1wuy-5w5r-bubj
6
vulnerability VCID-2qjc-yspn-xydj
7
vulnerability VCID-2r38-yjx6-uuae
8
vulnerability VCID-32hs-eqw2-1kf2
9
vulnerability VCID-34fv-tv5a-tkgw
10
vulnerability VCID-3gwr-t9bx-47cj
11
vulnerability VCID-3jx3-v6c9-3be2
12
vulnerability VCID-43ff-97jw-hkce
13
vulnerability VCID-48pt-6j6q-jbcn
14
vulnerability VCID-5211-bpr9-nqaf
15
vulnerability VCID-542z-gtvr-ykck
16
vulnerability VCID-5499-3dkq-9fc2
17
vulnerability VCID-55vv-7jsj-xqeh
18
vulnerability VCID-58np-gsxj-8yc4
19
vulnerability VCID-5yue-52xt-ryhw
20
vulnerability VCID-63fe-saga-13ct
21
vulnerability VCID-67av-c7qh-5kek
22
vulnerability VCID-6jv8-3wch-wfew
23
vulnerability VCID-6rhm-xrwe-x7af
24
vulnerability VCID-6xqn-t8j4-skgs
25
vulnerability VCID-6yxw-veq3-eqgd
26
vulnerability VCID-7kus-4n4f-myd1
27
vulnerability VCID-7m8s-6ydk-gbgr
28
vulnerability VCID-7ner-5xz7-93gz
29
vulnerability VCID-7pts-41xh-mbh4
30
vulnerability VCID-7pxs-dc7h-tkbs
31
vulnerability VCID-7tfx-9358-gygx
32
vulnerability VCID-7tjs-ybpe-r7hg
33
vulnerability VCID-8kjy-xtm2-bqan
34
vulnerability VCID-8mfb-mmaz-mfab
35
vulnerability VCID-8pdp-epea-juhj
36
vulnerability VCID-8qy8-gk53-eufc
37
vulnerability VCID-8shw-ev6h-dqgh
38
vulnerability VCID-8sys-3sj7-c3h6
39
vulnerability VCID-8yav-jpp1-rfbe
40
vulnerability VCID-917e-7kp2-y3hw
41
vulnerability VCID-986n-21m7-fuc8
42
vulnerability VCID-9at6-bgzv-gue3
43
vulnerability VCID-9f9j-z7y7-sffy
44
vulnerability VCID-9u4p-wdky-a3h1
45
vulnerability VCID-9w61-sh1p-aqff
46
vulnerability VCID-9xk8-m5c3-wud8
47
vulnerability VCID-a2n5-xpy5-gyfh
48
vulnerability VCID-a442-jcja-zych
49
vulnerability VCID-a5sa-32q2-s3he
50
vulnerability VCID-a8uf-chxy-9udv
51
vulnerability VCID-adsx-448w-vbem
52
vulnerability VCID-ap3n-99gn-aucs
53
vulnerability VCID-apn8-j2e8-uka5
54
vulnerability VCID-ay1n-kp3k-37db
55
vulnerability VCID-b1vq-vecs-pfev
56
vulnerability VCID-b4z5-5hbq-5ka8
57
vulnerability VCID-bbhx-pe8h-fubn
58
vulnerability VCID-bk8r-brkr-bqc6
59
vulnerability VCID-bknu-abgc-bugw
60
vulnerability VCID-bv3b-3h5a-s7ez
61
vulnerability VCID-byqv-c5jp-6ybg
62
vulnerability VCID-c4n3-bd3z-qfbw
63
vulnerability VCID-c765-b3fs-nbdu
64
vulnerability VCID-cupt-538a-z3fp
65
vulnerability VCID-cvp4-5uvw-xff2
66
vulnerability VCID-czy4-hnuj-fbgx
67
vulnerability VCID-d791-zjab-jfh1
68
vulnerability VCID-d8sn-7zbc-4bhy
69
vulnerability VCID-ddpb-zwva-rfc5
70
vulnerability VCID-dmv1-4jgk-e3cq
71
vulnerability VCID-dpra-jbea-4fcy
72
vulnerability VCID-e1yx-dxa6-1bba
73
vulnerability VCID-e7t9-pdx7-5kgm
74
vulnerability VCID-ebcm-kjvz-73cz
75
vulnerability VCID-edp8-yh2h-xuck
76
vulnerability VCID-ehd7-39bz-2ybk
77
vulnerability VCID-ehx4-qzgr-qbd9
78
vulnerability VCID-ennr-ek9z-a7db
79
vulnerability VCID-epzp-dpmr-33df
80
vulnerability VCID-eund-5mfa-9kbn
81
vulnerability VCID-f1y5-37zk-x3ey
82
vulnerability VCID-f4br-7sgk-27cf
83
vulnerability VCID-f5qc-tsbr-1yap
84
vulnerability VCID-fdpu-1891-q3a6
85
vulnerability VCID-fjzf-5rtw-rqfj
86
vulnerability VCID-fndq-j9d2-afed
87
vulnerability VCID-fz7z-xttk-13by
88
vulnerability VCID-fzs1-dj22-7fff
89
vulnerability VCID-ggu9-8qd1-4ffx
90
vulnerability VCID-gkcp-1zz6-tfb5
91
vulnerability VCID-gy3u-c6dc-sbbn
92
vulnerability VCID-h193-vjhb-j3a3
93
vulnerability VCID-h52b-ubb6-byh1
94
vulnerability VCID-h8nm-exgj-xybc
95
vulnerability VCID-hj93-7z1r-vkfk
96
vulnerability VCID-huqt-1fv6-67cz
97
vulnerability VCID-hvmt-7qk8-wqh1
98
vulnerability VCID-jwaj-b8n5-bbcx
99
vulnerability VCID-k1zu-wpsb-wyh3
100
vulnerability VCID-kby8-5rnd-fffs
101
vulnerability VCID-kdex-mwf6-13br
102
vulnerability VCID-m27d-dqzg-w7gr
103
vulnerability VCID-m3gv-mmcp-t7fz
104
vulnerability VCID-m9wv-atrb-c3ac
105
vulnerability VCID-mcd2-e66p-j3b7
106
vulnerability VCID-mcfv-fuk8-cqaq
107
vulnerability VCID-mmqp-yesh-83c1
108
vulnerability VCID-n6mj-v1nc-hke9
109
vulnerability VCID-nf5d-nejq-mkd9
110
vulnerability VCID-ngds-k5mh-t3ae
111
vulnerability VCID-nzu7-8h1d-mbbw
112
vulnerability VCID-p5vz-kq6m-63dd
113
vulnerability VCID-p6k6-8gxf-sydp
114
vulnerability VCID-phb4-xaj7-byg2
115
vulnerability VCID-pmte-bc34-pfcv
116
vulnerability VCID-psbg-wv2x-w7ba
117
vulnerability VCID-q6w8-pqsz-7ud4
118
vulnerability VCID-qcqe-63ev-f7gv
119
vulnerability VCID-qksp-5hqu-7qad
120
vulnerability VCID-qpwr-bqps-77cc
121
vulnerability VCID-qsqz-g9fv-6bgg
122
vulnerability VCID-r6s6-y3q8-vydc
123
vulnerability VCID-r8b9-jcqa-xyb2
124
vulnerability VCID-rb5h-mvxt-7qhv
125
vulnerability VCID-rb9n-t857-1uac
126
vulnerability VCID-re5z-334n-e7a2
127
vulnerability VCID-rn9b-2scp-byf5
128
vulnerability VCID-rwug-45gf-s3bz
129
vulnerability VCID-s3p6-93jg-p7c3
130
vulnerability VCID-s7qt-9z8z-y7bx
131
vulnerability VCID-sb1c-cz2g-dycu
132
vulnerability VCID-sqgd-ykvk-2qay
133
vulnerability VCID-sw4t-1yct-ffbd
134
vulnerability VCID-tekr-xkck-pkfu
135
vulnerability VCID-tqwd-ffwc-mkd1
136
vulnerability VCID-tyh4-14zn-63ez
137
vulnerability VCID-u4gv-ss9p-sqe9
138
vulnerability VCID-u91b-9huy-43hn
139
vulnerability VCID-u99q-b5ug-jyd5
140
vulnerability VCID-u9xx-wevm-ufdh
141
vulnerability VCID-urhv-6gz3-u7fr
142
vulnerability VCID-v7ev-jtsg-cqdg
143
vulnerability VCID-vwf4-v4ve-4yfh
144
vulnerability VCID-w7ce-jd16-xbbs
145
vulnerability VCID-w94b-nwsf-wkg3
146
vulnerability VCID-w9ce-m3x8-n3ak
147
vulnerability VCID-w9e8-ekah-wfg2
148
vulnerability VCID-wfgw-5dme-yfan
149
vulnerability VCID-wsh5-yefr-d7ad
150
vulnerability VCID-wz3z-sq5y-pbd6
151
vulnerability VCID-x2gp-mft6-1yhy
152
vulnerability VCID-xbe4-uvqu-6kf7
153
vulnerability VCID-xqg6-5cn7-4bct
154
vulnerability VCID-xt5z-2sgq-4fc4
155
vulnerability VCID-y3vu-z8tx-tubb
156
vulnerability VCID-y6sx-xqsh-wbcg
157
vulnerability VCID-ytty-tbs1-ffc7
158
vulnerability VCID-yx1m-ayfg-ryc3
159
vulnerability VCID-z3fq-m317-ckb8
160
vulnerability VCID-zabf-adce-sqde
161
vulnerability VCID-zbwp-f5me-jqhu
162
vulnerability VCID-zgqk-kej8-qkhg
163
vulnerability VCID-zkuy-4hqk-vkca
164
vulnerability VCID-zn8s-5jkp-bkbr
165
vulnerability VCID-zr2v-gabj-8kak
166
vulnerability VCID-zvpn-2gds-9yc4
167
vulnerability VCID-zvwt-wp8r-1qhx
168
vulnerability VCID-zxkf-88k3-3qcn
169
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.2.13~dfsg-2etch4
4
url pkg:deb/debian/asterisk@1:1.4.21.2~dfsg-3%2Blenny6
purl pkg:deb/debian/asterisk@1:1.4.21.2~dfsg-3%2Blenny6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1cad-s6nn-j7aw
2
vulnerability VCID-1qxc-4xk5-2feu
3
vulnerability VCID-1u6r-4dzb-wfh2
4
vulnerability VCID-1wuy-5w5r-bubj
5
vulnerability VCID-2qjc-yspn-xydj
6
vulnerability VCID-2r38-yjx6-uuae
7
vulnerability VCID-32hs-eqw2-1kf2
8
vulnerability VCID-34fv-tv5a-tkgw
9
vulnerability VCID-3jx3-v6c9-3be2
10
vulnerability VCID-43ff-97jw-hkce
11
vulnerability VCID-48pt-6j6q-jbcn
12
vulnerability VCID-542z-gtvr-ykck
13
vulnerability VCID-55vv-7jsj-xqeh
14
vulnerability VCID-5yue-52xt-ryhw
15
vulnerability VCID-63fe-saga-13ct
16
vulnerability VCID-67av-c7qh-5kek
17
vulnerability VCID-6jv8-3wch-wfew
18
vulnerability VCID-6rhm-xrwe-x7af
19
vulnerability VCID-6xqn-t8j4-skgs
20
vulnerability VCID-6yxw-veq3-eqgd
21
vulnerability VCID-7kus-4n4f-myd1
22
vulnerability VCID-7m8s-6ydk-gbgr
23
vulnerability VCID-7ner-5xz7-93gz
24
vulnerability VCID-7pts-41xh-mbh4
25
vulnerability VCID-7pxs-dc7h-tkbs
26
vulnerability VCID-7tfx-9358-gygx
27
vulnerability VCID-7tjs-ybpe-r7hg
28
vulnerability VCID-8kjy-xtm2-bqan
29
vulnerability VCID-8mfb-mmaz-mfab
30
vulnerability VCID-8pdp-epea-juhj
31
vulnerability VCID-8qy8-gk53-eufc
32
vulnerability VCID-8shw-ev6h-dqgh
33
vulnerability VCID-8sys-3sj7-c3h6
34
vulnerability VCID-8yav-jpp1-rfbe
35
vulnerability VCID-917e-7kp2-y3hw
36
vulnerability VCID-986n-21m7-fuc8
37
vulnerability VCID-9at6-bgzv-gue3
38
vulnerability VCID-9f9j-z7y7-sffy
39
vulnerability VCID-9u4p-wdky-a3h1
40
vulnerability VCID-9xk8-m5c3-wud8
41
vulnerability VCID-a2n5-xpy5-gyfh
42
vulnerability VCID-ap3n-99gn-aucs
43
vulnerability VCID-apn8-j2e8-uka5
44
vulnerability VCID-ay1n-kp3k-37db
45
vulnerability VCID-b4z5-5hbq-5ka8
46
vulnerability VCID-bbhx-pe8h-fubn
47
vulnerability VCID-bk8r-brkr-bqc6
48
vulnerability VCID-bknu-abgc-bugw
49
vulnerability VCID-bv3b-3h5a-s7ez
50
vulnerability VCID-byqv-c5jp-6ybg
51
vulnerability VCID-c4n3-bd3z-qfbw
52
vulnerability VCID-cupt-538a-z3fp
53
vulnerability VCID-cvp4-5uvw-xff2
54
vulnerability VCID-czy4-hnuj-fbgx
55
vulnerability VCID-d8sn-7zbc-4bhy
56
vulnerability VCID-ddpb-zwva-rfc5
57
vulnerability VCID-dmv1-4jgk-e3cq
58
vulnerability VCID-dpra-jbea-4fcy
59
vulnerability VCID-e1yx-dxa6-1bba
60
vulnerability VCID-e7t9-pdx7-5kgm
61
vulnerability VCID-ebcm-kjvz-73cz
62
vulnerability VCID-edp8-yh2h-xuck
63
vulnerability VCID-ehd7-39bz-2ybk
64
vulnerability VCID-ehx4-qzgr-qbd9
65
vulnerability VCID-ennr-ek9z-a7db
66
vulnerability VCID-epzp-dpmr-33df
67
vulnerability VCID-eund-5mfa-9kbn
68
vulnerability VCID-f1y5-37zk-x3ey
69
vulnerability VCID-f4br-7sgk-27cf
70
vulnerability VCID-f5qc-tsbr-1yap
71
vulnerability VCID-fdpu-1891-q3a6
72
vulnerability VCID-fjzf-5rtw-rqfj
73
vulnerability VCID-fndq-j9d2-afed
74
vulnerability VCID-fz7z-xttk-13by
75
vulnerability VCID-fzs1-dj22-7fff
76
vulnerability VCID-ggu9-8qd1-4ffx
77
vulnerability VCID-gkcp-1zz6-tfb5
78
vulnerability VCID-gy3u-c6dc-sbbn
79
vulnerability VCID-h193-vjhb-j3a3
80
vulnerability VCID-h52b-ubb6-byh1
81
vulnerability VCID-h8nm-exgj-xybc
82
vulnerability VCID-hj93-7z1r-vkfk
83
vulnerability VCID-huqt-1fv6-67cz
84
vulnerability VCID-hvmt-7qk8-wqh1
85
vulnerability VCID-jwaj-b8n5-bbcx
86
vulnerability VCID-k1zu-wpsb-wyh3
87
vulnerability VCID-kdex-mwf6-13br
88
vulnerability VCID-m27d-dqzg-w7gr
89
vulnerability VCID-m3gv-mmcp-t7fz
90
vulnerability VCID-mcfv-fuk8-cqaq
91
vulnerability VCID-mmqp-yesh-83c1
92
vulnerability VCID-n6mj-v1nc-hke9
93
vulnerability VCID-nf5d-nejq-mkd9
94
vulnerability VCID-ngds-k5mh-t3ae
95
vulnerability VCID-nzu7-8h1d-mbbw
96
vulnerability VCID-p5vz-kq6m-63dd
97
vulnerability VCID-phb4-xaj7-byg2
98
vulnerability VCID-pmte-bc34-pfcv
99
vulnerability VCID-psbg-wv2x-w7ba
100
vulnerability VCID-qcqe-63ev-f7gv
101
vulnerability VCID-qksp-5hqu-7qad
102
vulnerability VCID-qpwr-bqps-77cc
103
vulnerability VCID-qsqz-g9fv-6bgg
104
vulnerability VCID-r6s6-y3q8-vydc
105
vulnerability VCID-r8b9-jcqa-xyb2
106
vulnerability VCID-rb5h-mvxt-7qhv
107
vulnerability VCID-rn9b-2scp-byf5
108
vulnerability VCID-rwug-45gf-s3bz
109
vulnerability VCID-s3p6-93jg-p7c3
110
vulnerability VCID-s7qt-9z8z-y7bx
111
vulnerability VCID-sb1c-cz2g-dycu
112
vulnerability VCID-sqgd-ykvk-2qay
113
vulnerability VCID-sw4t-1yct-ffbd
114
vulnerability VCID-tekr-xkck-pkfu
115
vulnerability VCID-tqwd-ffwc-mkd1
116
vulnerability VCID-tyh4-14zn-63ez
117
vulnerability VCID-u4gv-ss9p-sqe9
118
vulnerability VCID-u91b-9huy-43hn
119
vulnerability VCID-u99q-b5ug-jyd5
120
vulnerability VCID-u9xx-wevm-ufdh
121
vulnerability VCID-urhv-6gz3-u7fr
122
vulnerability VCID-v7ev-jtsg-cqdg
123
vulnerability VCID-vwf4-v4ve-4yfh
124
vulnerability VCID-w9ce-m3x8-n3ak
125
vulnerability VCID-w9e8-ekah-wfg2
126
vulnerability VCID-x2gp-mft6-1yhy
127
vulnerability VCID-xbe4-uvqu-6kf7
128
vulnerability VCID-xqg6-5cn7-4bct
129
vulnerability VCID-xt5z-2sgq-4fc4
130
vulnerability VCID-y3vu-z8tx-tubb
131
vulnerability VCID-y6sx-xqsh-wbcg
132
vulnerability VCID-ytty-tbs1-ffc7
133
vulnerability VCID-yx1m-ayfg-ryc3
134
vulnerability VCID-z3fq-m317-ckb8
135
vulnerability VCID-zabf-adce-sqde
136
vulnerability VCID-zbwp-f5me-jqhu
137
vulnerability VCID-zgqk-kej8-qkhg
138
vulnerability VCID-zvpn-2gds-9yc4
139
vulnerability VCID-zvwt-wp8r-1qhx
140
vulnerability VCID-zxkf-88k3-3qcn
141
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.4.21.2~dfsg-3%252Blenny6
5
url pkg:deb/debian/asterisk@1:1.6.2.9-2%2Bsqueeze12
purl pkg:deb/debian/asterisk@1:1.6.2.9-2%2Bsqueeze12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-111d-qj24-nyde
1
vulnerability VCID-1qxc-4xk5-2feu
2
vulnerability VCID-1u6r-4dzb-wfh2
3
vulnerability VCID-1wuy-5w5r-bubj
4
vulnerability VCID-2qjc-yspn-xydj
5
vulnerability VCID-2r38-yjx6-uuae
6
vulnerability VCID-32hs-eqw2-1kf2
7
vulnerability VCID-34fv-tv5a-tkgw
8
vulnerability VCID-3jx3-v6c9-3be2
9
vulnerability VCID-43ff-97jw-hkce
10
vulnerability VCID-48pt-6j6q-jbcn
11
vulnerability VCID-542z-gtvr-ykck
12
vulnerability VCID-55vv-7jsj-xqeh
13
vulnerability VCID-5yue-52xt-ryhw
14
vulnerability VCID-63fe-saga-13ct
15
vulnerability VCID-67av-c7qh-5kek
16
vulnerability VCID-6jv8-3wch-wfew
17
vulnerability VCID-6rhm-xrwe-x7af
18
vulnerability VCID-6xqn-t8j4-skgs
19
vulnerability VCID-7kus-4n4f-myd1
20
vulnerability VCID-7m8s-6ydk-gbgr
21
vulnerability VCID-7ner-5xz7-93gz
22
vulnerability VCID-7pts-41xh-mbh4
23
vulnerability VCID-7tfx-9358-gygx
24
vulnerability VCID-7tjs-ybpe-r7hg
25
vulnerability VCID-8kjy-xtm2-bqan
26
vulnerability VCID-8mfb-mmaz-mfab
27
vulnerability VCID-8pdp-epea-juhj
28
vulnerability VCID-8qy8-gk53-eufc
29
vulnerability VCID-8shw-ev6h-dqgh
30
vulnerability VCID-8sys-3sj7-c3h6
31
vulnerability VCID-8yav-jpp1-rfbe
32
vulnerability VCID-917e-7kp2-y3hw
33
vulnerability VCID-9at6-bgzv-gue3
34
vulnerability VCID-9f9j-z7y7-sffy
35
vulnerability VCID-9u4p-wdky-a3h1
36
vulnerability VCID-9xk8-m5c3-wud8
37
vulnerability VCID-a2n5-xpy5-gyfh
38
vulnerability VCID-ap3n-99gn-aucs
39
vulnerability VCID-apn8-j2e8-uka5
40
vulnerability VCID-ay1n-kp3k-37db
41
vulnerability VCID-b4z5-5hbq-5ka8
42
vulnerability VCID-bbhx-pe8h-fubn
43
vulnerability VCID-bk8r-brkr-bqc6
44
vulnerability VCID-bknu-abgc-bugw
45
vulnerability VCID-bv3b-3h5a-s7ez
46
vulnerability VCID-byqv-c5jp-6ybg
47
vulnerability VCID-cupt-538a-z3fp
48
vulnerability VCID-cvp4-5uvw-xff2
49
vulnerability VCID-czy4-hnuj-fbgx
50
vulnerability VCID-d8sn-7zbc-4bhy
51
vulnerability VCID-ddpb-zwva-rfc5
52
vulnerability VCID-dmv1-4jgk-e3cq
53
vulnerability VCID-dpra-jbea-4fcy
54
vulnerability VCID-e1yx-dxa6-1bba
55
vulnerability VCID-e7t9-pdx7-5kgm
56
vulnerability VCID-ebcm-kjvz-73cz
57
vulnerability VCID-edp8-yh2h-xuck
58
vulnerability VCID-ehd7-39bz-2ybk
59
vulnerability VCID-ehx4-qzgr-qbd9
60
vulnerability VCID-epzp-dpmr-33df
61
vulnerability VCID-eund-5mfa-9kbn
62
vulnerability VCID-f1y5-37zk-x3ey
63
vulnerability VCID-f4br-7sgk-27cf
64
vulnerability VCID-f5qc-tsbr-1yap
65
vulnerability VCID-fjzf-5rtw-rqfj
66
vulnerability VCID-fndq-j9d2-afed
67
vulnerability VCID-fz7z-xttk-13by
68
vulnerability VCID-ggu9-8qd1-4ffx
69
vulnerability VCID-gkcp-1zz6-tfb5
70
vulnerability VCID-gy3u-c6dc-sbbn
71
vulnerability VCID-h193-vjhb-j3a3
72
vulnerability VCID-h52b-ubb6-byh1
73
vulnerability VCID-hj93-7z1r-vkfk
74
vulnerability VCID-huqt-1fv6-67cz
75
vulnerability VCID-hvmt-7qk8-wqh1
76
vulnerability VCID-jwaj-b8n5-bbcx
77
vulnerability VCID-k1zu-wpsb-wyh3
78
vulnerability VCID-kdex-mwf6-13br
79
vulnerability VCID-m27d-dqzg-w7gr
80
vulnerability VCID-mcfv-fuk8-cqaq
81
vulnerability VCID-mmqp-yesh-83c1
82
vulnerability VCID-n6mj-v1nc-hke9
83
vulnerability VCID-nf5d-nejq-mkd9
84
vulnerability VCID-ngds-k5mh-t3ae
85
vulnerability VCID-nzu7-8h1d-mbbw
86
vulnerability VCID-p5vz-kq6m-63dd
87
vulnerability VCID-phb4-xaj7-byg2
88
vulnerability VCID-pmte-bc34-pfcv
89
vulnerability VCID-psbg-wv2x-w7ba
90
vulnerability VCID-qcqe-63ev-f7gv
91
vulnerability VCID-qksp-5hqu-7qad
92
vulnerability VCID-qpwr-bqps-77cc
93
vulnerability VCID-qsqz-g9fv-6bgg
94
vulnerability VCID-r6s6-y3q8-vydc
95
vulnerability VCID-r8b9-jcqa-xyb2
96
vulnerability VCID-rb5h-mvxt-7qhv
97
vulnerability VCID-rwug-45gf-s3bz
98
vulnerability VCID-s3p6-93jg-p7c3
99
vulnerability VCID-s7qt-9z8z-y7bx
100
vulnerability VCID-sb1c-cz2g-dycu
101
vulnerability VCID-sqgd-ykvk-2qay
102
vulnerability VCID-sw4t-1yct-ffbd
103
vulnerability VCID-tqwd-ffwc-mkd1
104
vulnerability VCID-tyh4-14zn-63ez
105
vulnerability VCID-u4gv-ss9p-sqe9
106
vulnerability VCID-u91b-9huy-43hn
107
vulnerability VCID-u9xx-wevm-ufdh
108
vulnerability VCID-urhv-6gz3-u7fr
109
vulnerability VCID-v7ev-jtsg-cqdg
110
vulnerability VCID-vwf4-v4ve-4yfh
111
vulnerability VCID-w9ce-m3x8-n3ak
112
vulnerability VCID-w9e8-ekah-wfg2
113
vulnerability VCID-x2gp-mft6-1yhy
114
vulnerability VCID-xbe4-uvqu-6kf7
115
vulnerability VCID-xqg6-5cn7-4bct
116
vulnerability VCID-xt5z-2sgq-4fc4
117
vulnerability VCID-y3vu-z8tx-tubb
118
vulnerability VCID-y6sx-xqsh-wbcg
119
vulnerability VCID-ytty-tbs1-ffc7
120
vulnerability VCID-yx1m-ayfg-ryc3
121
vulnerability VCID-z3fq-m317-ckb8
122
vulnerability VCID-zabf-adce-sqde
123
vulnerability VCID-zbwp-f5me-jqhu
124
vulnerability VCID-zgqk-kej8-qkhg
125
vulnerability VCID-zvwt-wp8r-1qhx
126
vulnerability VCID-zxkf-88k3-3qcn
127
vulnerability VCID-zzpx-gwmv-sfbz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.6.2.9-2%252Bsqueeze12
References
0
reference_url http://downloads.asterisk.org/pub/security/AST-2013-002.html
reference_id
reference_type
scores
url http://downloads.asterisk.org/pub/security/AST-2013-002.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2686
reference_id
reference_type
scores
0
value 0.02448
scoring_system epss
scoring_elements 0.85194
published_at 2026-04-13T12:55:00Z
1
value 0.02448
scoring_system epss
scoring_elements 0.85123
published_at 2026-04-01T12:55:00Z
2
value 0.02448
scoring_system epss
scoring_elements 0.85135
published_at 2026-04-02T12:55:00Z
3
value 0.02448
scoring_system epss
scoring_elements 0.85153
published_at 2026-04-04T12:55:00Z
4
value 0.02448
scoring_system epss
scoring_elements 0.85155
published_at 2026-04-07T12:55:00Z
5
value 0.02448
scoring_system epss
scoring_elements 0.85177
published_at 2026-04-08T12:55:00Z
6
value 0.02448
scoring_system epss
scoring_elements 0.85185
published_at 2026-04-09T12:55:00Z
7
value 0.02448
scoring_system epss
scoring_elements 0.852
published_at 2026-04-11T12:55:00Z
8
value 0.02448
scoring_system epss
scoring_elements 0.85197
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2686
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2686
3
reference_url https://issues.asterisk.org/jira/browse/ASTERISK-20967
reference_id
reference_type
scores
url https://issues.asterisk.org/jira/browse/ASTERISK-20967
4
reference_url http://telussecuritylabs.com/threats/show/TSL20130327-01
reference_id
reference_type
scores
url http://telussecuritylabs.com/threats/show/TSL20130327-01
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704114
reference_id 704114
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704114
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:certified_asterisk:1.8.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:certified_asterisk:1.8.15.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15.0:rc1:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:rc1:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:rc1:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:rc1:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:rc2:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:rc2:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:rc2:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:rc3:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:rc3:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.15:cert1:rc3:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:beta1:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:beta2:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:rc1:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:rc2:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.0.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.0.0:rc3:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.1.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.10.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.10.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.10.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.10.0:rc1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.10.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.10.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.10.0:rc2:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.1.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.1.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.1.0:rc1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.1.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.1.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.1.0:rc2:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.11.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.11.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.11.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.11.0:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.11.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.11.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.11.0:rc2:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.11.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.11.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.11.0:rc3:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.12.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.12.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.12.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.12.0:rc1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.12.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.12.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.12.0:rc2:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.12.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.2.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.2.0:rc1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.2.0:rc2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.2.0:rc3:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.2.0:rc4:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.3.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.3.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.3.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.3.0:rc2:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.3.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.3.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.3.0:rc3:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.4.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.4.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.4.0:rc1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.4.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.4.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.4.0:rc2:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.4.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.4.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.4.0:rc3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.5.0:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.5.0:rc2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.6.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.6.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.6.0:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.6.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.6.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.6.0:rc2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.7.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.7.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.7.0:rc1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.8.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.8.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.8.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.8.0:rc1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.8.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.8.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.8.0:rc2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.9.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:digiumphones:10.9.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:10.9.0:rc1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.10.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.10.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.10.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.10.0:rc1:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.10.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.10.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.10.0:rc2:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.10.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.1.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.0:rc1:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.1.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.0:rc2:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.11.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.11.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.11.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.11.0:rc1:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.11.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.11.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.11.0:rc3:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.11.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.12.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.12.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.12.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.12.0:rc1:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.12.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.12.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.12.0:rc2:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.12.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc1:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc2:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc3:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.2.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc4:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.3.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.0:rc2:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.3.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.0:rc3:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.1:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.4.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:rc1:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.4.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:rc2:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.4.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:rc3:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.2:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.5.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.5.0:rc1:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.5.0:rc2:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.5.1:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.5.2:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.6.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.6.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.6.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.6.0:rc1:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.6.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.6.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.6.0:rc2:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.6.1:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.7.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.7.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.7.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.7.0:rc1:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.7.1:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.8.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.8.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.8.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.8.0:rc1:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.8.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.8.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.8.0:rc2:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.9.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.9.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.9.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.9.0:rc1:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.9.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.9.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.9.0:rc2:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.9.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:10.9.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.9.0:rc3:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:beta1:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:beta2:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:rc1:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:rc2:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.1:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.2:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.1.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:rc1:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.1.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:rc3:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.1:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.2:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:rc1:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:rc2:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:11.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.1:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.10.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc1:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.10.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc2:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.10.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc3:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.10.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc4:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.1:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.0:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.11.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.0:rc2:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.11.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.0:rc3:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.1:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.12.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.0:rc1:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.12.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.0:rc2:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.12.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.0:rc3:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.1:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.2:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.13.0:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.13.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.13.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.13.0:rc1:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.13.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.13.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.13.0:rc2:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.13.1:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.14.0:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.14.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.14.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.14.0:rc1:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.14.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.14.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.14.0:rc2:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.14.1:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.15.0:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.15.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.15.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.15.0:rc1:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.15.1:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.16.0:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.16.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.16.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.16.0:rc1:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.16.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.16.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.16.0:rc2:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.17.0:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.17.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.17.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.17.0:rc1:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.17.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.17.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.17.0:rc2:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.17.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.17.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.17.0:rc3:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.18.0:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.18.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.18.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.18.0:rc1:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.18.1:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.19.0:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.19.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.19.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.19.0:rc1:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.19.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.19.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.19.0:rc3:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.19.1:*:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.20.0:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.20.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.20.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.20.0:rc1:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.20.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.20.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.20.0:rc2:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.20.1:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.1:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.2:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.3:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.4:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3.1:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3.2:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3.3:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.3:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:rc2:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.3:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:rc3:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.1:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.2:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.3:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.4:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:rc1:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.4:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:rc2:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.4:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:rc3:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.1:*:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.2:*:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.1:*:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.2:*:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:*:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.9.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:rc1:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.9.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:rc2:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.9.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:rc3:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.1:*:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.2:*:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:asterisk:open_source:1.8.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.3:*:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2686
reference_id CVE-2013-2686
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2686
239
reference_url https://security.gentoo.org/glsa/201401-15
reference_id GLSA-201401-15
reference_type
scores
url https://security.gentoo.org/glsa/201401-15
Weaknesses
0
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
Severity_range_score5.0 - 5.0
Exploitability0.5
Weighted_severity4.5
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-h52b-ubb6-byh1