Lucene search

K

CVE-2012-2186

🗓️ 31 Aug 2012 14:00:55Reported by [email protected]Type 
nvd
 nvd
🔗 web.nvd.nist.gov👁 6 Views

Incomplete blacklist vulnerability in Asterisk Open Source and Business Edition allows remote authenticated users to execute arbitrary commands

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Detection
Refs
Nvd
Node
OR
asteriskopen_sourceMatch1.8.0beta1
OR
asteriskopen_sourceMatch1.8.0beta2
OR
asteriskopen_sourceMatch1.8.0beta3
OR
asteriskopen_sourceMatch1.8.0beta4
OR
asteriskopen_sourceMatch1.8.0beta5
OR
asteriskopen_sourceMatch1.8.0rc1
OR
asteriskopen_sourceMatch1.8.0rc2
OR
asteriskopen_sourceMatch1.8.0rc3
OR
asteriskopen_sourceMatch1.8.0rc4
OR
asteriskopen_sourceMatch1.8.0rc5
OROR
asteriskopen_sourceMatch1.8.1rc1
OROROROR
asteriskopen_sourceMatch1.8.2rc1
OROROROROROR
asteriskopen_sourceMatch1.8.3rc1
OR
asteriskopen_sourceMatch1.8.3rc2
OR
asteriskopen_sourceMatch1.8.3rc3
OROROROROR
asteriskopen_sourceMatch1.8.4rc1
OR
asteriskopen_sourceMatch1.8.4rc2
OR
asteriskopen_sourceMatch1.8.4rc3
OROROROROR
asteriskopen_sourceMatch1.8.5rc1
OROROR
asteriskopen_sourceMatch1.8.6.0rc1
OR
asteriskopen_sourceMatch1.8.6.0rc2
OR
asteriskopen_sourceMatch1.8.6.0rc3
OROROR
asteriskopen_sourceMatch1.8.7.0rc1
OR
asteriskopen_sourceMatch1.8.7.0rc2
OROROROR
asteriskopen_sourceMatch1.8.8.0rc1
OR
asteriskopen_sourceMatch1.8.8.0rc2
OR
asteriskopen_sourceMatch1.8.8.0rc3
OR
asteriskopen_sourceMatch1.8.8.0rc4
OR
asteriskopen_sourceMatch1.8.8.0rc5
OROROROR
asteriskopen_sourceMatch1.8.9.0rc1
OR
asteriskopen_sourceMatch1.8.9.0rc2
OR
asteriskopen_sourceMatch1.8.9.0rc3
OROROROR
asteriskopen_sourceMatch1.8.10.0
OR
asteriskopen_sourceMatch1.8.10.0rc1
OR
asteriskopen_sourceMatch1.8.10.0rc2
OR
asteriskopen_sourceMatch1.8.10.0rc3
OR
asteriskopen_sourceMatch1.8.10.0rc4
OR
asteriskopen_sourceMatch1.8.10.1
OR
asteriskopen_sourceMatch1.8.11.0
OR
asteriskopen_sourceMatch1.8.11.0rc2
OR
asteriskopen_sourceMatch1.8.11.0rc3
OR
asteriskopen_sourceMatch1.8.11.1
OROR
asteriskopen_sourceMatch1.8.12.0
OR
asteriskopen_sourceMatch1.8.12.0rc1
OR
asteriskopen_sourceMatch1.8.12.0rc2
OR
asteriskopen_sourceMatch1.8.12.0rc3
OR
sangomaasteriskRange1.8.15.0
Node
OR
asteriskopen_sourceMatch10.0.0beta1
OR
asteriskopen_sourceMatch10.0.0beta2
OR
asteriskopen_sourceMatch10.0.0rc1
OR
asteriskopen_sourceMatch10.0.0rc2
OR
asteriskopen_sourceMatch10.0.0rc3
OROROR
asteriskopen_sourceMatch10.1.0rc1
OR
asteriskopen_sourceMatch10.1.0rc2
OROROROROR
asteriskopen_sourceMatch10.2.0rc1
OR
asteriskopen_sourceMatch10.2.0rc2
OR
asteriskopen_sourceMatch10.2.0rc3
OR
asteriskopen_sourceMatch10.2.0rc4
OROROROR
asteriskopen_sourceMatch10.3.0rc2
OR
asteriskopen_sourceMatch10.3.0rc3
OROROR
asteriskopen_sourceMatch10.4.0rc1
OR
asteriskopen_sourceMatch10.4.0rc2
OR
asteriskopen_sourceMatch10.4.0rc3
OR
sangomaasteriskRange10.7.0
Node
asteriskcertified_asteriskRange1.8.11cert5
OROROROROR
Node
asteriskdigiumphonesRange10.7.0

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo