Search for vulnerabilities
Vulnerability details: VCID-22z5-ccc7-aaag
Vulnerability ID VCID-22z5-ccc7-aaag
Aliases CVE-2010-0441
Summary Asterisk Open Source 1.6.0.x before 1.6.0.22, 1.6.1.x before 1.6.1.14, and 1.6.2.x before 1.6.2.2, and Business Edition C.3 before C.3.3.2, allows remote attackers to cause a denial of service (daemon crash) via an SIP T.38 negotiation with an SDP FaxMaxDatagram field that is (1) missing, (2) modified to contain a negative number, or (3) modified to contain a large number.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.03526 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.04875 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.34160 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.91849 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.91849 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.91849 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
epss 0.91849 https://api.first.org/data/v1/epss?cve=CVE-2010-0441
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=561332
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2010-0441
Reference id Reference type URL
http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.0.diff
http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.1.diff
http://downloads.asterisk.org/pub/security/AST-2010-001-1.6.2.diff
http://downloads.asterisk.org/pub/security/AST-2010-001.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0441.json
https://api.first.org/data/v1/epss?cve=CVE-2010-0441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0441
http://secunia.com/advisories/38395
http://secunia.com/advisories/39096
http://securitytracker.com/id?1023532
https://issues.asterisk.org/view.php?id=16517
https://issues.asterisk.org/view.php?id=16634
https://issues.asterisk.org/view.php?id=16724
http://www.securityfocus.com/archive/1/509327/100/0/threaded
http://www.securityfocus.com/bid/38047
http://www.vupen.com/english/advisories/2010/0289
561332 https://bugzilla.redhat.com/show_bug.cgi?id=561332
cpe:2.3:a:asterisk:asterisk:1.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.10:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.13:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.14:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.15:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.16-rc1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.16-rc1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.16-rc2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.16-rc2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.17:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.18:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.18-rc1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.18-rc1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.18-rc2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.18-rc2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.18-rc3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.18-rc3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.19:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.20:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.20-rc1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.20-rc1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.21:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.21-rc1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.21-rc1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.8:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.0.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.0.9:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.10-rc1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.10-rc1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.10-rc2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.10-rc2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.10:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.10-rc1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.10-rc1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.10-rc2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.10-rc2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.10-rc3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.10-rc3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.11:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.12-rc1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.12-rc1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.13:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.13-rc1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.13-rc1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.5:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.7-rc1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.7-rc1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.7-rc2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.7-rc2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.8:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.1.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.1.9:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:1.6.2.1-rc1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:1.6.2.1-rc1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:c.3.1.0:*:business:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:c.3.1.0:*:business:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:c.3.1.1:*:business:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:c.3.1.1:*:business:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:c.3.2.2:*:business:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:c.3.2.2:*:business:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk:c.3.3.3:*:business:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk:c.3.3.3:*:business:*:*:*:*:*
CVE-2010-0441 https://nvd.nist.gov/vuln/detail/CVE-2010-0441
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2010-0441
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.86553
EPSS Score 0.03526
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.