Search for vulnerabilities
Vulnerability details: VCID-ngv7-s1fz-aaaa
Vulnerability ID VCID-ngv7-s1fz-aaaa
Aliases CVE-2012-2186
Summary Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action.
Status Published
Exploitability 0.5
Weighted Severity 8.1
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01196 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
epss 0.01437 https://api.first.org/data/v1/epss?cve=CVE-2012-2186
cvssv2 9.0 https://nvd.nist.gov/vuln/detail/CVE-2012-2186
Reference id Reference type URL
http://downloads.asterisk.org/pub/security/AST-2012-012.html
https://api.first.org/data/v1/epss?cve=CVE-2012-2186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4737
http://secunia.com/advisories/50687
http://secunia.com/advisories/50756
http://www.debian.org/security/2012/dsa-2550
http://www.securitytracker.com/id?1027460
680470 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680470
cpe:2.3:a:asterisk:business_edition:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:business_edition:*:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:business_edition:c.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:business_edition:c.3.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:*:cert5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:certified_asterisk:*:cert5:*:*:*:*:*:*
cpe:2.3:a:asterisk:digiumphones:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:digiumphones:*:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.1.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.0:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.0:rc4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.3.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.3.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.3.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.4.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.4.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.4.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:10.4.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.0:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.0:rc4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.10.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.11.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.11.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.11.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.11.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.12.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.12.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.12.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.12.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.3:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.4:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.7.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.8.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.8.9.3:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*
CVE-2012-2186 https://nvd.nist.gov/vuln/detail/CVE-2012-2186
GLSA-201209-15 https://security.gentoo.org/glsa/201209-15
No exploits are available.
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2012-2186
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.61528
EPSS Score 0.00465
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.