Search for vulnerabilities
Vulnerability details: VCID-u989-1a5c-aaaf
Vulnerability ID VCID-u989-1a5c-aaaf
Aliases CVE-2008-1897
Summary The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.03226 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.07215 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.91625 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.91625 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.91625 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.91625 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92227 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92227 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92227 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92300 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92300 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92300 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92300 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92300 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92300 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92300 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
epss 0.92300 https://api.first.org/data/v1/epss?cve=CVE-2008-1897
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=443761
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2008-1897
Reference id Reference type URL
http://bugs.digium.com/view.php?id=10078
http://downloads.digium.com/pub/security/AST-2008-006.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1897.json
https://api.first.org/data/v1/epss?cve=CVE-2008-1897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1897
https://downloads.asterisk.org/pub/security/AST-2008-006.html
http://secunia.com/advisories/29927
http://secunia.com/advisories/30010
http://secunia.com/advisories/30042
http://secunia.com/advisories/34982
http://security.gentoo.org/glsa/glsa-200905-01.xml
https://exchange.xforce.ibmcloud.com/vulnerabilities/41966
https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e
https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90
https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2
https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb
https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653
https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b
https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6
https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7
https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a
https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00600.html
http://www.altsci.com/concepts/page.php?s=asteri&p=2
http://www.debian.org/security/2008/dsa-1563
http://www.securityfocus.com/archive/1/491220/100/0/threaded
http://www.securityfocus.com/bid/28901
http://www.securitytracker.com/id?1019918
http://www.vupen.com/english/advisories/2008/1324
443761 https://bugzilla.redhat.com/show_bug.cgi?id=443761
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta7:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta8:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisk_business_edition:c.1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:asterisknow:1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:asterisknow:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.11.1:patch:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.11.1:patch:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.11:patch:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.11:patch:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.12:patch:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.12:patch:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:s800i:1.1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:s800i:1.1.0.1:*:*:*:*:*:*:*
CVE-2008-1897 https://nvd.nist.gov/vuln/detail/CVE-2008-1897
GLSA-200905-01 https://security.gentoo.org/glsa/200905-01
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2008-1897
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.85931
EPSS Score 0.03226
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.