Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

Filtering: Tag: asterisk Clear
ID Title
CVE-2017-17850 Vulnerability in digium (CVE-2017-17850)
vulnerability in digium (CVE-2017-17850). Risk of unauthorized operations or information disclosure.
CVE-2017-17664 Buffer Overflow in digium (CVE-2017-17664)
vulnerability in digium (CVE-2017-17664). Risk of unauthorized operations or information disclosure.
CVE-2017-17090 Vulnerability in c (CVE-2017-17090)
vulnerability in c (CVE-2017-17090). Risk of unauthorized operations or information disclosure.
CVE-2017-16671 Buffer Overflow in digium (CVE-2017-16671)
vulnerability in digium (CVE-2017-16671). Successful exploitation can lead to full system takeover.
CVE-2017-16672 Vulnerability in digium (CVE-2017-16672)
vulnerability in digium (CVE-2017-16672). Risk of unauthorized operations or information disclosure.
CVE-2017-14603 Information Disclosure in digium (CVE-2017-14603)
vulnerability in digium (CVE-2017-14603). Confidential information can be exposed externally.
CVE-2017-14098 Vulnerability in digium (CVE-2017-14098)
vulnerability in digium (CVE-2017-14098). Risk of unauthorized operations or information disclosure.
CVE-2017-14099 Information Disclosure in c (CVE-2017-14099)
vulnerability in c (CVE-2017-14099). Confidential information can be exposed externally.
CVE-2017-14100 OS Command Injection in digium (CVE-2017-14100)
OS command injection in digium (CVE-2017-14100). Successful exploitation can lead to full system takeover.
CVE-2017-9358 Vulnerability in sangoma (CVE-2017-9358)
vulnerability in sangoma (CVE-2017-9358). Risk of unauthorized operations or information disclosure.
CVE-2016-7551 Vulnerability in dos (CVE-2016-7551)
vulnerability in dos (CVE-2016-7551). Risk of unauthorized operations or information disclosure.
CVE-2017-7617 Buffer Overflow in digium (CVE-2017-7617)
vulnerability in digium (CVE-2017-7617). Successful exploitation can lead to full system takeover.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →