Known Vulnerabilities for Open Source by Asterisk

Listed below are 10 of the newest known vulnerabilities associated with "Open Source" by "Asterisk".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-45130 json Vim is an open source, command line text editor. Prior to version 9.2.0450, a heap buffer overflow exists in read_compound() ... Not Provided 2026-05-08 2026-05-08
CVE-2026-44656 json Vim is an open source, command line text editor. Prior to version 9.2.0435, an OS command injection vulnerability exists in V... Not Provided 2026-05-08 2026-05-08
CVE-2026-44548 json ChurchCRM is an open-source church management system. Prior to 7.3.2, top-level cross-site GET navigation from an attacker-co... Not Provided 2026-05-12 2026-05-12
CVE-2026-44547 json ChurchCRM is an open-source church management system. From 7.2.0 to 7.2.2, The fix for CVE-2026-4058 is incomplete. The harde... Not Provided 2026-05-12 2026-05-12
CVE-2026-44352 json Flowsint is an open-source OSINT graph exploration tool designed for cybersecurity investigation, transparency, and verificat... Not Provided 2026-05-12 2026-05-12
CVE-2026-44347 json Warpgate is an open source SSH, HTTPS and MySQL bastion host for Linux. Prior to 0.23.3, the SSO flow does not validate the s... Not Provided 2026-05-12 2026-05-12
CVE-2026-44313 json Linkwarden is a self-hosted, open-source collaborative bookmark manager to collect, organize and archive webpages. Prior to v... Not Provided 2026-05-09 2026-05-11
CVE-2026-44298 json Kimai is an open-source time tracking application. From version 2.32.0 to before version 2.56.0, users with the role System-A... Not Provided 2026-05-08 2026-05-08
CVE-2026-44226 json pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, pyload-ng WebUI returns full Py... Not Provided 2026-05-11 2026-05-11
CVE-2026-44224 json Wiki.js is an open source wiki app built on Node.js. Prior to 2.5.313, the users.update GraphQL mutation accepts an arbitrary... Not Provided 2026-05-12 2026-05-12

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationAsteriskOpen Source18.0.1
ApplicationAsteriskOpen Source18.0.0
ApplicationAsteriskOpen Source17.8.1
ApplicationAsteriskOpen Source17.0.0
ApplicationAsteriskOpen Source16.14.1
ApplicationAsteriskOpen Source16.0.0
ApplicationAsteriskOpen Source15.4.1
ApplicationAsteriskOpen Source15.4.0
ApplicationAsteriskOpen Source15.3.0
ApplicationAsteriskOpen Source15.2.2
ApplicationAsteriskOpen Source15.2.1
ApplicationAsteriskOpen Source15.2.0
ApplicationAsteriskOpen Source15.1.5
ApplicationAsteriskOpen Source15.1.4
ApplicationAsteriskOpen Source15.1.2
ApplicationAsteriskOpen Source15.1.0
ApplicationAsteriskOpen Source15.0.0
ApplicationAsteriskOpen Source14.4.0
ApplicationAsteriskOpen Source14.3.0
ApplicationAsteriskOpen Source14.2.1
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report