Multiple vulnerabilities in Asterisk can be exploited by a remote, anonymous attacker to perform a denial-of-service attack, bypass security measures, or execute a SQL injection.
| Vendor | Product | Versions |
|---|---|---|
| digium | asterisk | — |
Updated description with new attack vectors, changed severity to HIGH, and marked the vulnerability as actively exploited with an available exploit.
Initial creation