Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 311,380
With exploit
digium / asterisk
You can search for specific versions with
https://synscan.net/product/asterisk/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2023-49294
Low
Dec 14, 2023
< 18.20.1
>= 19.0.0 < 20.5.1
== 21.0.0
CVE-2023-37457
High
Dec 14, 2023
<= 18.20.0
>= 19.0.0 <= 20.5.0
== 21.0.0
CVE-2023-49786
High
Dec 14, 2023
< 18.20.1
>= 19.0.0 < 20.5.1
== 21.0.0
CVE-2021-46837
Medium
Aug 30, 2022
>= 16.0.0 < 16.16.2
>= 17.0.0 < 17.9.3
>= 18.0.0 < 18.2.2
CVE-2022-26498
High
Apr 15, 2022
>= 16.15.0 <= 16.25.1
>= 18.0 < 18.11.2
>= 19.0.0 <= 19.3.1
CVE-2022-26499
Critical
Apr 15, 2022
>= 16.15.0 <= 16.25.1
>= 18.0 < 18.11.2
>= 19.0.0 <= 19.3.1
CVE-2022-26651
Critical
Apr 15, 2022
>= 16.0.0 < 16.25.2
>= 18.0 < 18.11.2
>= 19.0.0 < 19.3.2
CVE-2021-31878
Medium
Jul 30, 2021
== 18.3.0
== 18.4.0
== 16.17.0
== 16.18.0
== 16.19.0
== 18.5.0
CVE-2021-32558
High
Jul 30, 2021
>= 13.0.0 < 13.38.3
>= 16.0.0 < 16.19.1
>= 17.0.0 < 17.9.4
>= 18.0.0 < 18.15.1
CVE-2021-26713
Medium
Feb 19, 2021
>= 16.0.0 < 16.16.1
>= 17.0.0 < 17.9.2
>= 18.0.0 < 18.2.1
‹
›
‹
1
2
3
4
5
6
...
11
12
›
asterisk / asterisk
You can search for specific versions with
https://synscan.net/product/asterisk/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2024-42365
High
Aug 8, 2024
>= 19.0.0 < 20.9.1
< 18.24.2
== 21.4.0
CVE-2010-0441
Medium
Feb 4, 2010
== 1.6.0.18
== 1.6.1.13
== 1.6.0.6
== 1.6.1.12
== 1.6.1.9
== 1.6.0.14
== c.3.3.3
== 1.6.0.5
== 1.6.0.18-rc2
== 1.6.1.10-rc2
== 1.6.1.12-rc1
== 1.6.1.10
== 1.6.1.7-rc1
== 1.6.0.19
== 1.6.0.21-rc1
== 1.6.10-rc1
== 1.6.0.1
== 1.6.0.7
== 1.6.0.12
== 1.6.1.7-rc2
== 1.6.0.13
== 1.6.1.10-rc1
== 1.6.0.18-rc1
== 1.6.1.2
== 1.6.1.1
== 1.6.10-rc2
== 1.6.0.20
== 1.6.1.11
== 1.6.1.8
== 1.6.0.9
== 1.6.0.16-rc2
== 1.6.1.4
== 1.6.1.13-rc1
== 1.6.0.16-rc1
== 1.6.0.21
== c.3.1.0
== 1.6.1.10-rc3
== 1.6.0.15
== 1.6.1.6
== 1.6.0.20-rc1
== 1.6.1.5
== 1.6.0.17
== c.3.2.2
== 1.6.2.1-rc1
== 1.6.0.18-rc3
== 1.6.1.0
== 1.6.0.8
== 1.6.0
== 1.6.0.3
== 1.6.2.1
== c.3.1.1
== 1.6.0.2
== 1.6.0.10
CVE-2009-2346
High
Sep 8, 2009
== b.1.3.2
== b.1.3.3
== b.2.2.0
== b.2.2.1
== b.2.3.1
== b.2.3.2
== b.2.3.3
== b.2.3.4
== b.2.3.5
== b.2.3.6
== b.2.5.1
== b.2.5.3
== b.2.5.4
== b.2.5.5
== b.2.5.6
== b.2.5.8
== b.2.5.9
== c.1.0_beta7
== c.1.0_beta8
== c.1.10.3
== c.1.10.4
== c.1.10.5
== c.1.6
== c.1.6.1
== c.1.6.2
== c.1.8.1
== c.2.1.2.1
== c.2.3
== c.2.3.3
== c.2.4.2
== c.3.1.0
CVE-2008-3263
High
Jul 22, 2008
== 1.4.12
== a
== 1.2.2
== 0.1.11
== 1.4.13
== 0.1.7
== 1.0.11
== 1.2.27
== 1.2.18
== 1.2.28
== 1.2.19
== 1.4.18.1
== 1.2.14
== 1.4.16.2
== 1.2.4
== 1.2.16
== 1.0.1
== 0.3
== b.1.3.2
== 0.1.5
== 1.0.4
== 1.2.24
== 1.6
== 0.7.2
== 0.1.6
== 1.2.26
== 0.1.1
== 1.2.20
== 1.2.5
== 0.1.9_1
== 1.4.11
== 1.0.11.1
== 1.4_revision_95946
== b.1.3.3
== 0.1.8
== 1.2.22
== 1.0.8
== 1.2.26.1
== 1.4.3
== 1.4_beta
== 1.0.3
== 0.1.3
== 1.4.14
== 1.2.6
== 0.1.0
== 1.2.7
== 1.2.9.1
== 0.5.0
== 1.4.5
== 0.1.12
== 1.4.9
== 1.2.21
== 1.4.6
== 1.2.0_beta1
== 1.4.17
== 0.9.0
== 1.0.12
== b.2.2.0
== 1.4.8
== 1.2.3
== 1.2.8
== 1.2.26.2
== 1.4.4
== 1.4.19
== 1.4.2
== 1.2.25
== 0.7.1
== 1.2.28.1
== 1.4.16
== 1.0-rc1
== 1.2.15
== 1.0.2
== 1.4.15
== 1.2.23
== 1.2.7.1
== 0.4
== 1.2.17
== 0.1.2
== 1.2.1
== 1.0.5
== 1.4.10
== 1.2.30
== 1.2.11
== 1.4.7
== 1.2.12
== 1.0.6
== 0.1.4
== 0.1.9
== 1.0.9
== 1.2.10
== 1.2.9
== 1.4.18
== 1.4.16.1
== 1.2.29
== 1.0.7
== 1.2.13
== 1.2.0_beta2
== 1.0
== 0.7.0
== 1.4.1
== 1.4.4_2007-04-27
== 1.0.10
== 0.2
== 0.1.10
CVE-2008-1390
High
Mar 24, 2008
== 1.4_beta
== 1.4_revision_95946
== 1.4.1
== 1.4.10
== 1.4.11
== 1.4.12
== 1.4.13
== 1.4.14
== 1.4.15
== 1.4.16
== 1.4.17
== 1.4.18.1
== 1.4.2
== 1.4.3
== 1.4.4
== 1.4.5
== 1.4.6
== 1.4.7
== 1.4.8
== 1.4.9
== 1.6
CVE-2008-1332
High
Mar 20, 2008
== a
== b.1.3.2
== b.1.3.3
== b.2.2.0
== b.2.2.1
== b.2.3.1
== b.2.3.2
== b.2.3.3
== b.2.3.4
== b.2.3.5
== b.2.3.6
== c.1.0_beta7
== c.1.0_beta8
== c.1.6
== c.1.6.1
CVE-2007-4521
Medium
Aug 28, 2007
== 1.4.11
== 1.4.5
== 1.4.9
== 1.4.6
== 1.4.8
== 1.4.10
== 1.4.7
CVE-2007-4455
Medium
Aug 22, 2007
<= 1.4.9
CVE-2007-4280
Low
Aug 9, 2007
<= 1.4.9
CVE-2007-3762
High
Jul 18, 2007
== 1.0.11
== 1.2.14
== 1.2.16
== 1.2.5
== b.1.3.3
== 1.0.8
== 1.4_beta
== 1.2.6
== 1.2.7
== 1.2.0_beta1
== 1.0.12
== b.2.2.0
== 1.2.8
== 1.4.2
== 1.2.15
== 1.2.17
== 1.2.11
== 1.2.12
== 1.0.6
== 1.0.9
== b.1.3.2
== 1.2.10
== 1.2.9
== 1.0.7
== 1.2.13
== 1.2.0_beta2
== 1.0
== 1.4.1
== 1.4.4_2007-04-27
== 1.0.10
== a
‹
›
‹
1
2
›
sangoma / asterisk
You can search for specific versions with
https://synscan.net/product/asterisk/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2025-1131
High
Sep 23, 2025
< 18.26.3
>= 20.0.0 < 20.15.1
>= 21.0.0 < 21.10.1
>= 22.0.0 < 22.5.1
CVE-2025-57767
High
Aug 28, 2025
< 20.15.2
>= 21.0.0 < 21.10.2
>= 22.0.0 < 22.5.2
CVE-2025-54995
Medium
Aug 28, 2025
< 18.26.4
CVE-2025-49832
Medium
Aug 1, 2025
< 18.26.3
>= 20.0.0 < 20.15.1
>= 21.0.0 < 21.10.1
>= 22.0.0 < 22.5.1
CVE-2025-47779
High
May 22, 2025
< 18.26.2
>= 20.0.0 < 20.14.1
>= 21.0.0 < 21.9.1
>= 22.0.0 < 22.4.1
CVE-2025-47780
High
May 22, 2025
< 18.26.2
>= 20.0.0 < 20.14.1
>= 21.0.0 < 21.9.1
>= 22.0.0 < 22.4.1
CVE-2024-57520
Critical
Feb 5, 2025
>= 22.0.0 <= 22.5.1
CVE-2024-53566
Medium
Dec 2, 2024
== 22.0.0
== 22.0.0-pre1
== 22.0.0-rc1
== 22.0.0-rc2
CVE-2024-42491
Medium
Sep 5, 2024
< 18.24.3
>= 20.0.0 < 20.9.3
>= 21.0.0 <= 21.4.3
CVE-2024-35190
Medium
May 17, 2024
== 18.23.0
== 20.8.0
== 21.3.0
‹
›
‹
1
2
3
›