Update #3205 (09/05/2019)
6 new signatures:
MEDIUM | HTTP:EYOU-CMS-FILE-UL | HTTP: Eyou CMS File Upload |
HIGH | HTTP:MISC:UNITRENDS-UEB-RCE | HTTP: Unitrends UEB Remote Code Execution |
HIGH | APP:MISC:DISKSAVVY-BOF | APP: Disksavvy Enterprise Server Remote Code Execution |
HIGH | HTTP:CTS:CVE-2018-8736-PRI-ESC | HTTP: Nagios XI 5.2.x through 5.4.x before 5.4.13 privilege escalation |
MEDIUM | HTTP:STC:ADOBE:CVE-2019-8004-ID | HTTP: Adobe Acrobat Reader CVE-2019-8004 Information Disclosure |
HIGH | DOS:DIGIUM-PJSIP-DOS | DOS: Digium Asterisk PJSIP In-Dialog MESSAGE Request Denial-of-Service |
1 updated signature:
MEDIUM | HTTP:STC:ADOBE:CVE-2019-8106-ID | HTTP: Adobe Acrobat CVE-2019-8106 Out Of Bounds Read |
4 renamed signatures:
HTTP2:CVE-2019-0199-DOS | -> | HTTP2:APACHE-CVE-2019-0199-DOS |
HTTP2:HTTP2-HAPROXY-BO | -> | HTTP2:HAPROXY-BO |
HTTP2:TOMCAT-HTTP2-DOS | -> | HTTP2:APACHE-TOMCAT-DOS |
HTTP2:MICOSOFT-HTTP2-DOS | -> | HTTP2:MICROSOFT-DOS |
Details of the signatures included within this bulletin:
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against eyou CMS. A successful attack can lead to Information Disclosure.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Unitrends UEB. A successful attack can lead to Remote Code Execution
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
APP:MISC:DISKSAVVY-BOF - APP: Disksavvy Enterprise Server Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Disksavvy Enterprise Server. A successful attack can lead to Remote Code Execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Flexense disksavvy_enterprise 10.4.18
HTTP:CTS:CVE-2018-8736-PRI-ESC - HTTP: Nagios XI 5.2.x through 5.4.x before 5.4.13 privilege escalation
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Nagios XI. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Nagios nagios_xi 5.2.2
- Nagios nagios_xi 5.4.9
- Nagios nagios_xi 5.3.0
- Nagios nagios_xi 5.4.8
- Nagios nagios_xi 5.3.1
- Nagios nagios_xi 5.3.2
- Nagios nagios_xi 5.3.3
- Nagios nagios_xi 5.4.10
- Nagios nagios_xi 5.3.4
- Nagios nagios_xi 5.2.8
- Nagios nagios_xi 5.4.3
- Nagios nagios_xi 5.4.2
- Nagios nagios_xi 5.4.1
- Nagios nagios_xi 5.2.5
- Nagios nagios_xi 5.4.0
- Nagios nagios_xi 5.2.4
- Nagios nagios_xi 5.4.7
- Nagios nagios_xi 5.2.7
- Nagios nagios_xi 5.4.6
- Nagios nagios_xi 5.2.6
- Nagios nagios_xi 5.4.5
- Nagios nagios_xi 5.2.1
- Nagios nagios_xi 5.2.9
- Nagios nagios_xi 5.4.4
- Nagios nagios_xi 5.2.0
- Nagios nagios_xi 5.4.12
- Nagios nagios_xi 5.4.11
- Nagios nagios_xi 5.2.3
HTTP2:MICROSOFT-DOS - HTTP2: Microsoft HTTP/2 Denial Of Services
Severity: HIGH
Description:
A denial-of-service vulnerability exists in Microsoft Windows' HTTP 2.0 protocol stack. Successful exploitation of this vulnerability can cause the target system to become unresponsive, resulting in a denial-of-service condition.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, idp-4.2.110101203, idp-5.1.0, j-series-9.5, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-4.2.110100823, isg-3.5.141818, isg-3.5.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft windows_10 -
- Microsoft windows_10 1511
HTTP2:APACHE-TOMCAT-DOS - HTTP2: Apache Tomcat HTTP2 Connection Window Exhaustion Denial of Service
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against HTTP/2 module of Apache Tomcat. A successful attack can result in a denial-of-service condition.
Supported On:
srx-branch-19.2, vsrx3bsd-19.2, srx-17.3, vsrx-17.4, srx-branch-17.4, srx-17.4, vsrx-15.1, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2
References:
Affected Products:
- Apache tomcat 9.0.4
- Apache tomcat 8.5.33
- Apache tomcat 8.5.25
- Apache tomcat 9.0.13
- Apache tomcat 9.0.5
- Apache tomcat 8.5.30
- Apache tomcat 8.5.24
- Apache tomcat 8.5.6
- Apache tomcat 9.0.2
- Apache tomcat 8.5.31
- Apache tomcat 8.5.13
- Apache tomcat 8.5.7
- Apache tomcat 8.5.36
- Apache tomcat 8.5.15
- Apache tomcat 9.0.3
- Apache tomcat 8.5.10
- Apache tomcat 8.5.40
- Apache tomcat 8.5.4
- Apache tomcat 9.0.0
- Apache tomcat 8.5.37
- Apache tomcat 8.5.21
- Apache tomcat 8.5.5
- Apache tomcat 8.5.9
- Apache tomcat 9.0.1
- Apache tomcat 8.5.34
- Apache tomcat 8.5.20
- Apache tomcat 8.5.2
- Apache tomcat 8.5.35
- Apache tomcat 8.5.23
- Apache tomcat 9.0.19
- Apache tomcat 8.5.22
- Apache tomcat 8.5.0
- Apache tomcat 8.5.16
- Apache tomcat 8.5.1
- Apache tomcat 8.5.11
- Apache tomcat 8.5.27
- Apache tomcat 8.5.3
- Apache tomcat 8.5.38
- Apache tomcat 9.0.14
- Apache tomcat 9.0.8
- Apache tomcat 8.5.29
- Apache tomcat 8.5.39
- Apache tomcat 8.5.26
- Apache tomcat 9.0.15
- Apache tomcat 9.0.9
- Apache tomcat 8.5.28
- Apache tomcat 8.5.18
- Apache tomcat 9.0.16
- Apache tomcat 8.5.19
- Apache tomcat 8.5.12
- Apache tomcat 9.0.17
- Apache tomcat 8.5.17
- Apache tomcat 8.5.32
- Apache tomcat 9.0.10
- Apache tomcat 9.0.6
- Apache tomcat 9.0.11
- Apache tomcat 9.0.12
- Apache tomcat 9.0.7
- Apache tomcat 8.5.14
- Apache tomcat 8.5.8
HTTP2:HAPROXY-BO - HTTP2: HAProxy HTTP/2 Frame Size Heap Buffer Overflow
Severity: HIGH
Description:
A heap-based buffer overflow vulnerability exists in HAProxy. A remote, unauthenticated attacker could exploit this vulnerability by sending a malicious request to the target server. Successful exploitation may result in denial of service conditions.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, idp-4.2.110101203, idp-5.1.0, j-series-9.5, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-4.2.110100823, isg-3.5.141818, isg-3.5.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Haproxy haproxy 1.3.4
- Haproxy haproxy -
- Haproxy haproxy 1.1.0
- Haproxy haproxy 1.2.18
- Haproxy haproxy 1.7.1
- Haproxy haproxy 1.6.9
- Haproxy haproxy 1.3.18
- Haproxy haproxy 1.5.4
- Haproxy haproxy 1.6.14
- Haproxy haproxy 1.1.2
- Haproxy haproxy 1.5.6
- Haproxy haproxy 1.1.4
- Haproxy haproxy 1.3.12.3
- Haproxy haproxy 1.5.0
- Haproxy haproxy 1.6.10
- Haproxy haproxy 1.1.6
- Haproxy haproxy 1.7.0
- Haproxy haproxy 1.6.3
- Haproxy haproxy 1.5.2
- Haproxy haproxy 1.6.12
- Haproxy haproxy 1.3.13.1
- Haproxy haproxy 1.1.10
- Haproxy haproxy 1.2.10.1
- Haproxy haproxy 1.3.11.2
- Haproxy haproxy 1.6.1
- Haproxy haproxy 1.3.15.3
- Haproxy haproxy 1.1.12
- Haproxy haproxy 1.3.8
- Haproxy haproxy 1.2.6
- Haproxy haproxy 1.6.7
- Haproxy haproxy 1.3.15.1
- Haproxy haproxy 1.1.14
- Haproxy haproxy 1.2.4
- Haproxy haproxy 1.3.15.11
- Haproxy haproxy 1.6.5
- Haproxy haproxy 1.5.8
- Haproxy haproxy 1.5.9
- Haproxy haproxy 1.1.16
- Haproxy haproxy 1.2.2
- Haproxy haproxy 1.5.14
- Haproxy haproxy 1.2.11.1
- Haproxy haproxy 1.3.15.5
- Haproxy haproxy 1.1.18
- Haproxy haproxy 1.2.0
- Haproxy haproxy 1.5.16
- Haproxy haproxy 1.8.5
- Haproxy haproxy 1.3.6.1
- Haproxy haproxy 1.3.10
- Haproxy haproxy 1.3.14.7
- Haproxy haproxy 1.5.10
- Haproxy haproxy 1.8.7
- Haproxy haproxy 1.3.23
- Haproxy haproxy 1.3.15.7
- Haproxy haproxy 1.3.16
- Haproxy haproxy 1.6
- Haproxy haproxy 1.3.14.5
- Haproxy haproxy 1.3.12.1
- Haproxy haproxy 1.5.12
- Haproxy haproxy 1.8.1
- Haproxy haproxy 1.0.0
- Haproxy haproxy 1.3.21
- Haproxy haproxy 1.3.14
- Haproxy haproxy 1.3.14.3
- Haproxy haproxy 1.3.9
- Haproxy haproxy 1.1.25
- Haproxy haproxy 1.3.14.13
- Haproxy haproxy 1.8.3
- Haproxy haproxy 1.0.2
- Haproxy haproxy 1.3.10.2
- Haproxy haproxy 1.3.14.1
- Haproxy haproxy 1.1.27
- Haproxy haproxy 1.3.14.11
- Haproxy haproxy 1.4.27
- Haproxy haproxy 1.2.5.1
- Haproxy haproxy 1.2.10
- Haproxy haproxy 1.5.18
- Haproxy haproxy 1.5.7
- Haproxy haproxy 1.1.9
- Haproxy haproxy 1.4.25
- Haproxy haproxy 1.2.12
- Haproxy haproxy 1.3.3
- Haproxy haproxy 1.1.23
- Haproxy haproxy 1.1.21
- Haproxy haproxy 1.3.8.2
- Haproxy haproxy 1.2.14
- Haproxy haproxy 1.3.1
- Haproxy haproxy 1.3.13
- Haproxy haproxy 1.7.8
- Haproxy haproxy 1.7.11
- Haproxy haproxy 1.3.7
- Haproxy haproxy 1.3.15.9
- Haproxy haproxy 1.3.5
- Haproxy haproxy 1.1.1
- Haproxy haproxy 1.3.8.1
- Haproxy haproxy 1.6.8
- Haproxy haproxy 1.3.14.9
- Haproxy haproxy 1.5.5
- Haproxy haproxy 1.3.12
- Haproxy haproxy 1.1.3
- Haproxy haproxy 1.7.7
- Haproxy haproxy 1.3.15.8
- Haproxy haproxy 1.1.5
- Haproxy haproxy 1.5.1
- Haproxy haproxy 1.1.7
- Haproxy haproxy 1.6.2
- Haproxy haproxy 1.5.3
- Haproxy haproxy 1.6.11
- Haproxy haproxy 1.1.11
- Haproxy haproxy 1.7.6
- Haproxy haproxy 1.6.0
- Haproxy haproxy 1.2.7.1
- Haproxy haproxy 1.6.13
- Haproxy haproxy 1.3.13.2
- Haproxy haproxy 1.3.19
- Haproxy haproxy 1.2.9
- Haproxy haproxy 1.3.11.3
- Haproxy haproxy 1.6.6
- Haproxy haproxy 1.1.15
- Haproxy haproxy 1.2.7
- Haproxy haproxy 1.3.15.10
- Haproxy haproxy 1.3.11.1
- Haproxy haproxy 1.6.4
- Haproxy haproxy 1.3.15.6
- Haproxy haproxy 1.1.17
- Haproxy haproxy 1.7.5
- Haproxy haproxy 1.2.5
- Haproxy haproxy 1.5.15
- Haproxy haproxy 1.3.15.4
- Haproxy haproxy 1.1.19
- Haproxy haproxy 1.2.3
- Haproxy haproxy 1.5.17
- Haproxy haproxy 1.8.4
- Haproxy haproxy 1.3.11
- Haproxy haproxy 1.2.1
- Haproxy haproxy 1.5.11
- Haproxy haproxy 1.8.6
- Haproxy haproxy 1.3.22
- Haproxy haproxy 1.3.17
- Haproxy haproxy 1.7.4
- Haproxy haproxy 1.3.14.6
- Haproxy haproxy 1.7.10
- Haproxy haproxy 1.5.13
- Haproxy haproxy 1.2.16
- Haproxy haproxy 1.7.3
- Haproxy haproxy 1.3.20
- Haproxy haproxy 1.3.15
- Haproxy haproxy 1.3.14.4
- Haproxy haproxy 1.1.24
- Haproxy haproxy 1.3.14.8
- Haproxy haproxy 1.8.2
- Haproxy haproxy 1.0.1
- Haproxy haproxy 1.3.11.4
- Haproxy haproxy 1.3.14.2
- Haproxy haproxy 1.3.12.2
- Haproxy haproxy 1.1.26
- Haproxy haproxy 1.3.14.12
- Haproxy haproxy 1.3.10.1
- Haproxy haproxy 1.2.5.2
- Haproxy haproxy 1.8.0
- Haproxy haproxy 1.3.12.4
- Haproxy haproxy 1.1.20
- Haproxy haproxy 1.3.14.10
- Haproxy haproxy 1.3.15.2
- Haproxy haproxy 1.4.26
- Haproxy haproxy 1.2.11
- Haproxy haproxy 1.1.22
- Haproxy haproxy 1.2.8
- Haproxy haproxy 1.1.8
- Haproxy haproxy 1.2.13
- Haproxy haproxy 1.3.2
- Haproxy haproxy 1.3.14.14
- Haproxy haproxy 1.7.9
- Haproxy haproxy 1.7.2
- Haproxy haproxy 1.2.15
- Haproxy haproxy 1.1.13
- Haproxy haproxy 1.3.0
- Haproxy haproxy 1.2.13.1
- Haproxy haproxy 1.2.17
- Haproxy haproxy 1.3.6
- Haproxy haproxy 1.4.7
- Haproxy haproxy 1.4.6
- Haproxy haproxy 1.4.15
- Haproxy haproxy 1.4.5
- Haproxy haproxy 1.4.14
- Haproxy haproxy 1.4.4
- Haproxy haproxy 1.4.17
- Haproxy haproxy 1.4.3
- Haproxy haproxy 1.4.16
- Haproxy haproxy 1.4.24
- Haproxy haproxy 1.4.2
- Haproxy haproxy 1.4.11
- Haproxy haproxy 1.4.1
- Haproxy haproxy 1.4.10
- Haproxy haproxy 1.4.0
- Haproxy haproxy 1.4.13
- Redhat enterprise_linux 7.5
- Haproxy haproxy 1.4.12
- Haproxy haproxy 1.4.20
- Redhat enterprise_linux 7.4
- Haproxy haproxy 1.4.21
- Haproxy haproxy 1.4.22
- Haproxy haproxy 1.4.23
- Haproxy haproxy 1.4.9
- Redhat enterprise_linux 7.0
- Redhat enterprise_linux 7.3
- Haproxy haproxy 1.4.8
- Haproxy haproxy 1.5
- Haproxy haproxy 1.4.19
- Haproxy haproxy 1.4
- Haproxy haproxy 1.4.18
HTTP:STC:ADOBE:CVE-2019-8004-ID - HTTP: Adobe Acrobat Reader CVE-2019-8004 Information Disclosure
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to Information Disclosure.
Supported On:
idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, vsrx-12.1, srx-branch-12.1, srx-branch-19.1, vsrx-15.1, srx-12.1
References:
Affected Products:
- Adobe acrobat_reader_dc 17.011.30059
- Adobe acrobat_dc 15.006.30198
- Adobe acrobat_dc 15.006.30498
- Adobe acrobat_dc 19.008.20074
- Adobe acrobat_reader_dc 17.011.30106
- Adobe acrobat_dc 17.011.30110
- Adobe acrobat_dc 17.011.30102
- Adobe acrobat_reader_dc 18.011.20038
- Adobe acrobat_dc 19.008.20081
- Adobe acrobat_dc 15.006.30417
- Adobe acrobat_reader_dc 15.010.20059
- Adobe acrobat_dc 18.011.20058
- Adobe acrobat_reader_dc 15.006.30094
- Adobe acrobat_reader_dc 18.009.20050
- Adobe acrobat_dc 15.017.20050
- Adobe acrobat_dc 17.009.20058
- Adobe acrobat_reader_dc 15.006.30198
- Adobe acrobat_dc 15.006.30464
- Adobe acrobat_reader_dc 15.006.30475
- Adobe acrobat_dc 17.011.30059
- Adobe acrobat_reader_dc 15.009.20069
- Adobe acrobat_reader_dc 15.010.20060
- Adobe acrobat_dc 15.006.30280
- Adobe acrobat_dc 19.010.20099
- Adobe acrobat_reader_dc 15.006.30498
- Adobe acrobat_dc 18.011.20038
- Adobe acrobat_dc 15.006.30243
- Adobe acrobat_dc 17.011.30140
- Adobe acrobat_dc 19.010.20100
- Adobe acrobat_reader_dc 17.011.30066
- Adobe acrobat_reader_dc 15.006.30280
- Adobe acrobat_dc 18.009.20050
- Adobe acrobat_reader_dc 15.006.30464
- Adobe acrobat_reader_dc 15.006.30243
- Adobe acrobat_dc 15.016.20039
- Adobe acrobat_reader_dc 17.009.20058
- Adobe acrobat_reader_dc 19.010.20099
- Adobe acrobat_reader_dc 19.010.20100
- Adobe acrobat_reader_dc 19.012.20034
- Adobe acrobat_dc 15.006.30121
- Adobe acrobat_reader_dc 15.020.20042
- Adobe acrobat_reader_dc 17.011.30142
- Adobe acrobat_dc 19.012.20034
- Adobe acrobat_reader_dc 17.012.20098
- Adobe acrobat_reader_dc 17.011.30080
- Adobe acrobat_reader_dc 15.023.20056
- Adobe acrobat_dc 19.010.20091
- Adobe acrobat_reader_dc 17.011.30140
- Adobe acrobat_dc 15.023.20056
- Adobe acrobat_dc 15.006.30097
- Adobe acrobat_reader_dc 17.011.30127
- Adobe acrobat_reader_dc 15.016.20039
- Adobe acrobat_dc 17.011.30080
- Adobe acrobat_reader_dc 15.006.30097
- Adobe acrobat_reader_dc 15.006.30121
- Adobe acrobat_reader_dc 18.011.20040
- Adobe acrobat_dc 17.011.30127
- Adobe acrobat_dc 17.011.30142
- Adobe acrobat_dc 17.011.30068
- Adobe acrobat_dc 15.008.20082
- Adobe acrobat_reader_dc 19.010.20091
- Adobe acrobat_reader_dc 17.011.30068
- Adobe acrobat_dc 15.006.30482
- Adobe acrobat_reader_dc 15.006.30355
- Adobe acrobat_dc 15.006.30173
- Adobe acrobat_reader_dc 15.008.20082
- Adobe acrobat_dc 17.012.20095
- Adobe acrobat_reader_dc 17.011.30110
- Adobe acrobat_dc 17.011.30099
- Adobe acrobat_reader_dc 17.009.20044
- Adobe acrobat_reader_dc 17.011.30099
- Adobe acrobat_reader_dc 15.006.30482
- Adobe acrobat_dc 17.011.30079
- Adobe acrobat_dc 19.008.20071
- Adobe acrobat_dc 15.006.30355
- Adobe acrobat_dc 15.006.30457
- Adobe acrobat_dc 15.010.20060
- Adobe acrobat_reader_dc 15.006.30457
- Adobe acrobat_reader_dc 19.008.20080
- Adobe acrobat_reader_dc 15.006.30497
- Adobe acrobat_dc 19.008.20080
- Adobe acrobat_reader_dc 18.011.20063
- Adobe acrobat_dc 15.006.30418
- Adobe acrobat_dc 15.006.30448
- Adobe acrobat_dc 17.011.30066
- Adobe acrobat_reader_dc 19.010.20069
- Adobe acrobat_reader_dc 15.006.30495
- Adobe acrobat_dc 15.017.20053
- Adobe acrobat_dc 17.009.20044
- Adobe acrobat_reader_dc 17.011.30079
- Adobe acrobat_dc 19.010.20069
- Adobe acrobat_dc 15.006.30493
- Adobe acrobat_dc 15.006.30279
- Adobe acrobat_dc 17.012.20096
- Adobe acrobat_reader_dc 15.006.30493
- Adobe acrobat_reader_dc 15.023.20070
- Adobe acrobat_reader_dc 15.006.30172
- Adobe acrobat_dc 17.011.30105
- Adobe acrobat_reader_dc 19.008.20071
- Adobe acrobat_dc 15.006.30495
- Adobe acrobat_dc 15.023.20070
- Adobe acrobat_dc 15.006.30174
- Adobe acrobat_dc 17.012.20098
- Adobe acrobat_dc 18.011.20063
- Adobe acrobat_reader_dc 15.006.30174
- Adobe acrobat_dc 15.006.30475
- Adobe acrobat_reader_dc 19.008.20074
- Adobe acrobat_dc 15.006.30497
- Adobe acrobat_dc 15.006.30172
- Adobe acrobat_reader_dc 15.006.30279
- Adobe acrobat_reader_dc 15.017.20053
- Adobe acrobat_dc 15.006.30416
- Adobe acrobat_reader_dc 17.011.30105
- Adobe acrobat_reader_dc 17.011.30113
- Adobe acrobat_dc 18.011.20040
- Adobe acrobat_reader_dc 15.010.20056
- Adobe acrobat_dc 19.010.20098
- Adobe acrobat_reader_dc 15.006.30461
- Adobe acrobat_reader_dc 15.006.30244
- Adobe acrobat_dc 18.011.20055
- Adobe acrobat_reader_dc 15.006.30201
- Adobe acrobat_reader_dc 17.011.30065
- Adobe acrobat_reader_dc 15.006.30417
- Adobe acrobat_dc 17.000.0000
- Adobe acrobat_dc 17.011.30113
- Adobe acrobat_dc 15.010.20056
- Adobe acrobat_dc 15.006.30244
- Adobe acrobat_dc 17.011.30143
- Adobe acrobat_dc 15.009.20079
- Adobe acrobat_reader_dc 19.008.20081
- Adobe acrobat_dc 15.023.20053
- Adobe acrobat_dc 18.009.20044
- Adobe acrobat_reader_dc 19.010.20098
- Adobe acrobat_reader_dc 18.011.20055
- Adobe acrobat_dc 15.006.30094
- Adobe acrobat_dc 17.011.30065
- Adobe acrobat_dc 15.009.20069
- Adobe acrobat_dc 15.006.30096
- Adobe acrobat_dc 15.006.30201
- Adobe acrobat_reader_dc 17.011.30096
- Adobe acrobat_dc 17.011.30120
- Adobe acrobat_reader_dc 15.009.20079
- Adobe acrobat_reader_dc 17.012.20093
- Adobe acrobat_reader_dc 15.016.20041
- Adobe acrobat_reader_dc 15.006.30434
- Adobe acrobat_dc 15.016.20041
- Adobe acrobat_reader_dc 15.006.30416
- Adobe acrobat_reader_dc 17.000.0000
- Adobe acrobat_reader_dc 17.011.30078
- Adobe acrobat_reader_dc 17.011.30102
- Adobe acrobat_reader_dc 15.006.30173
- Adobe acrobat_dc 17.011.30106
- Adobe acrobat_dc 15.010.20059
- Adobe acrobat_reader_dc 15.016.20045
- Adobe acrobat_reader_dc 15.017.20050
- Adobe acrobat_dc 15.006.30413
- Adobe acrobat_reader_dc 15.006.30418
- Adobe acrobat_dc 17.011.30096
- Adobe acrobat_dc 15.020.20039
- Adobe acrobat_dc 15.006.30060
- Adobe acrobat_dc 17.011.30070
- Adobe acrobat_reader_dc 15.023.20053
- Adobe acrobat_reader_dc 15.006.30096
- Adobe acrobat_reader_dc 15.009.20077
- Adobe acrobat_reader_dc 17.011.30120
- Adobe acrobat_reader_dc 17.012.20095
- Adobe acrobat_dc 15.009.20071
- Adobe acrobat_reader_dc 18.009.20044
- Adobe acrobat_reader_dc 15.020.20039
- Adobe acrobat_dc 19.010.20064
- Adobe acrobat_reader_dc 15.006.30354
- Adobe acrobat_dc 15.006.30352
- Adobe acrobat_reader_dc 15.006.30060
- Adobe acrobat_dc 15.006.30119
- Adobe acrobat_dc 15.006.30306
- Adobe acrobat_reader_dc 17.011.30070
- Adobe acrobat_reader_dc 15.009.20071
- Adobe acrobat_reader_dc 15.006.30392
- Adobe acrobat_reader_dc 15.006.30452
- Adobe acrobat_dc 17.011.30078
- Adobe acrobat_dc 15.009.20077
- Adobe acrobat_reader_dc 19.010.20064
- Adobe acrobat_dc 15.006.30394
- Adobe acrobat_dc 15.006.30456
- Adobe acrobat_reader_dc 15.006.30352
- Adobe acrobat_reader_dc 15.006.30306
- Adobe acrobat_reader_dc 15.006.30394
- Adobe acrobat_reader_dc 17.011.30138
- Adobe acrobat_dc 15.016.20045
- Adobe acrobat_dc 15.006.30354
- Adobe acrobat_dc 15.006.30392
- Adobe acrobat_dc 15.006.30434
- Adobe acrobat_reader_dc 15.006.30448
- Adobe acrobat_reader_dc 15.006.30456
- Adobe acrobat_dc 17.012.20093
- Adobe acrobat_dc 15.020.20042
- Adobe acrobat_reader_dc 15.006.30119
- Adobe acrobat_dc 15.006.30452
- Adobe acrobat_dc 17.011.30138
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat. A successful attack can lead to information disclosure.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Adobe acrobat_reader_dc 17.012.20093
- Adobe acrobat_reader_dc 15.016.20041
- Adobe acrobat_reader_dc 15.006.30434
- Adobe acrobat_dc 15.016.20041
- Adobe acrobat_reader_dc 15.006.30416
- Adobe acrobat_reader_dc 17.000.0000
- Adobe acrobat_reader_dc 17.011.30078
- Adobe acrobat_reader_dc 17.011.30102
- Adobe acrobat_reader_dc 15.006.30173
- Adobe acrobat_dc 17.011.30106
- Adobe acrobat_dc 15.010.20059
- Adobe acrobat_reader_dc 15.016.20045
- Adobe acrobat_reader_dc 15.017.20050
- Adobe acrobat_dc 15.006.30413
- Adobe acrobat_reader_dc 15.006.30418
- Adobe acrobat_reader_dc 17.011.30059
- Adobe acrobat_dc 15.006.30198
- Adobe acrobat_dc 15.006.30498
- Adobe acrobat_dc 19.008.20074
- Adobe acrobat_reader_dc 17.011.30106
- Adobe acrobat_dc 17.011.30110
- Adobe acrobat_dc 17.011.30102
- Adobe acrobat_reader_dc 18.011.20038
- Adobe acrobat_dc 19.008.20081
- Adobe acrobat_dc 15.006.30417
- Adobe acrobat_reader_dc 15.010.20059
- Adobe acrobat_dc 18.011.20058
- Adobe acrobat_reader_dc 15.006.30094
- Adobe acrobat_reader_dc 18.009.20050
- Adobe acrobat_dc 15.017.20050
- Adobe acrobat_dc 17.009.20058
- Adobe acrobat_reader_dc 15.006.30198
- Adobe acrobat_dc 15.006.30464
- Adobe acrobat_reader_dc 15.006.30475
- Adobe acrobat_dc 17.011.30059
- Adobe acrobat_reader_dc 15.009.20069
- Adobe acrobat_reader_dc 15.010.20060
- Adobe acrobat_dc 15.006.30280
- Adobe acrobat_dc 19.010.20099
- Adobe acrobat_reader_dc 15.006.30498
- Adobe acrobat_dc 18.011.20038
- Adobe acrobat_dc 15.006.30243
- Adobe acrobat_dc 17.011.30140
- Adobe acrobat_dc 19.010.20100
- Adobe acrobat_reader_dc 17.011.30066
- Adobe acrobat_reader_dc 15.006.30280
- Adobe acrobat_dc 18.009.20050
- Adobe acrobat_reader_dc 15.006.30464
- Adobe acrobat_reader_dc 15.006.30243
- Adobe acrobat_dc 15.016.20039
- Adobe acrobat_reader_dc 17.009.20058
- Adobe acrobat_reader_dc 19.010.20099
- Adobe acrobat_reader_dc 19.010.20100
- Adobe acrobat_reader_dc 19.012.20034
- Adobe acrobat_dc 15.006.30121
- Adobe acrobat_reader_dc 15.020.20042
- Adobe acrobat_reader_dc 17.011.30142
- Adobe acrobat_dc 19.012.20034
- Adobe acrobat_reader_dc 17.012.20098
- Adobe acrobat_reader_dc 17.011.30080
- Adobe acrobat_reader_dc 15.023.20056
- Adobe acrobat_dc 19.010.20091
- Adobe acrobat_reader_dc 17.011.30140
- Adobe acrobat_dc 15.023.20056
- Adobe acrobat_dc 15.006.30097
- Adobe acrobat_reader_dc 17.011.30127
- Adobe acrobat_reader_dc 15.016.20039
- Adobe acrobat_dc 17.011.30080
- Adobe acrobat_reader_dc 15.006.30097
- Adobe acrobat_reader_dc 15.006.30121
- Adobe acrobat_reader_dc 18.011.20040
- Adobe acrobat_dc 17.011.30127
- Adobe acrobat_dc 17.011.30142
- Adobe acrobat_dc 17.011.30068
- Adobe acrobat_dc 15.008.20082
- Adobe acrobat_reader_dc 19.010.20091
- Adobe acrobat_reader_dc 17.011.30068
- Adobe acrobat_dc 15.006.30482
- Adobe acrobat_reader_dc 15.006.30355
- Adobe acrobat_dc 15.006.30173
- Adobe acrobat_reader_dc 15.008.20082
- Adobe acrobat_dc 17.012.20095
- Adobe acrobat_reader_dc 17.011.30110
- Adobe acrobat_dc 17.011.30099
- Adobe acrobat_reader_dc 17.009.20044
- Adobe acrobat_reader_dc 17.011.30099
- Adobe acrobat_reader_dc 15.006.30482
- Adobe acrobat_dc 17.011.30079
- Adobe acrobat_dc 19.008.20071
- Adobe acrobat_dc 15.006.30355
- Adobe acrobat_dc 15.006.30457
- Adobe acrobat_dc 15.010.20060
- Adobe acrobat_reader_dc 15.006.30457
- Adobe acrobat_reader_dc 19.008.20080
- Adobe acrobat_reader_dc 15.006.30497
- Adobe acrobat_dc 19.008.20080
- Adobe acrobat_reader_dc 18.011.20063
- Adobe acrobat_dc 15.006.30418
- Adobe acrobat_dc 15.006.30448
- Adobe acrobat_dc 17.011.30066
- Adobe acrobat_reader_dc 19.010.20069
- Adobe acrobat_reader_dc 15.006.30495
- Adobe acrobat_dc 15.017.20053
- Adobe acrobat_dc 17.009.20044
- Adobe acrobat_reader_dc 17.011.30079
- Adobe acrobat_dc 19.010.20069
- Adobe acrobat_dc 15.006.30493
- Adobe acrobat_dc 15.006.30279
- Adobe acrobat_dc 17.012.20096
- Adobe acrobat_reader_dc 15.006.30493
- Adobe acrobat_reader_dc 15.023.20070
- Adobe acrobat_reader_dc 15.006.30172
- Adobe acrobat_dc 17.011.30105
- Adobe acrobat_reader_dc 19.008.20071
- Adobe acrobat_dc 15.006.30495
- Adobe acrobat_dc 15.023.20070
- Adobe acrobat_dc 15.006.30174
- Adobe acrobat_dc 17.012.20098
- Adobe acrobat_dc 18.011.20063
- Adobe acrobat_reader_dc 15.006.30174
- Adobe acrobat_dc 15.006.30475
- Adobe acrobat_reader_dc 19.008.20074
- Adobe acrobat_dc 15.006.30497
- Adobe acrobat_dc 15.006.30172
- Adobe acrobat_reader_dc 15.006.30279
- Adobe acrobat_reader_dc 15.017.20053
- Adobe acrobat_dc 15.006.30416
- Adobe acrobat_reader_dc 17.011.30105
- Adobe acrobat_reader_dc 17.011.30113
- Adobe acrobat_dc 18.011.20040
- Adobe acrobat_reader_dc 15.010.20056
- Adobe acrobat_dc 19.010.20098
- Adobe acrobat_reader_dc 15.006.30461
- Adobe acrobat_reader_dc 15.006.30244
- Adobe acrobat_dc 18.011.20055
- Adobe acrobat_reader_dc 15.006.30201
- Adobe acrobat_reader_dc 17.011.30065
- Adobe acrobat_reader_dc 15.006.30417
- Adobe acrobat_dc 17.000.0000
- Adobe acrobat_dc 17.011.30113
- Adobe acrobat_dc 15.010.20056
- Adobe acrobat_dc 15.006.30244
- Adobe acrobat_dc 17.011.30143
- Adobe acrobat_dc 15.009.20079
- Adobe acrobat_reader_dc 19.008.20081
- Adobe acrobat_dc 15.023.20053
- Adobe acrobat_dc 18.009.20044
- Adobe acrobat_reader_dc 19.010.20098
- Adobe acrobat_reader_dc 18.011.20055
- Adobe acrobat_dc 15.006.30094
- Adobe acrobat_dc 17.011.30065
- Adobe acrobat_dc 15.009.20069
- Adobe acrobat_dc 15.006.30096
- Adobe acrobat_dc 15.006.30201
- Adobe acrobat_reader_dc 17.011.30096
- Adobe acrobat_dc 17.011.30120
- Adobe acrobat_reader_dc 15.009.20079
- Adobe acrobat_dc 17.011.30096
- Adobe acrobat_dc 15.020.20039
- Adobe acrobat_dc 15.006.30060
- Adobe acrobat_dc 17.011.30070
- Adobe acrobat_reader_dc 15.023.20053
- Adobe acrobat_reader_dc 15.006.30096
- Adobe acrobat_reader_dc 15.009.20077
- Adobe acrobat_reader_dc 17.011.30120
- Adobe acrobat_reader_dc 17.012.20095
- Adobe acrobat_dc 15.009.20071
- Adobe acrobat_reader_dc 18.009.20044
- Adobe acrobat_reader_dc 15.020.20039
- Adobe acrobat_dc 19.010.20064
- Adobe acrobat_reader_dc 15.006.30354
- Adobe acrobat_dc 15.006.30352
- Adobe acrobat_reader_dc 15.006.30060
- Adobe acrobat_dc 15.006.30119
- Adobe acrobat_dc 15.006.30306
- Adobe acrobat_reader_dc 17.011.30070
- Adobe acrobat_reader_dc 15.009.20071
- Adobe acrobat_reader_dc 15.006.30392
- Adobe acrobat_reader_dc 15.006.30452
- Adobe acrobat_dc 17.011.30078
- Adobe acrobat_dc 15.009.20077
- Adobe acrobat_reader_dc 19.010.20064
- Adobe acrobat_dc 15.006.30394
- Adobe acrobat_dc 15.006.30456
- Adobe acrobat_reader_dc 15.006.30352
- Adobe acrobat_reader_dc 15.006.30306
- Adobe acrobat_reader_dc 15.006.30394
- Adobe acrobat_reader_dc 17.011.30138
- Adobe acrobat_dc 15.016.20045
- Adobe acrobat_dc 15.006.30354
- Adobe acrobat_dc 15.006.30392
- Adobe acrobat_dc 15.006.30434
- Adobe acrobat_reader_dc 15.006.30448
- Adobe acrobat_reader_dc 15.006.30456
- Adobe acrobat_dc 17.012.20093
- Adobe acrobat_dc 15.020.20042
- Adobe acrobat_reader_dc 15.006.30119
- Adobe acrobat_dc 15.006.30452
- Adobe acrobat_dc 17.011.30138
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Apache Tomcat. A successful attack can result in a denial-of-service condition.
Supported On:
srx-branch-19.2, vsrx3bsd-19.2, srx-17.3, vsrx-17.4, srx-branch-17.4, srx-17.4, vsrx-15.1, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2
References:
Affected Products:
- Apache tomcat 9.0.4
- Apache tomcat 8.5.33
- Apache tomcat 8.5.25
- Apache tomcat 9.0.13
- Apache tomcat 9.0.5
- Apache tomcat 8.5.30
- Apache tomcat 8.5.24
- Apache tomcat 8.5.6
- Apache tomcat 9.0.2
- Apache tomcat 8.5.31
- Apache tomcat 8.5.13
- Apache tomcat 8.5.7
- Apache tomcat 8.5.36
- Apache tomcat 8.5.15
- Apache tomcat 9.0.3
- Apache tomcat 8.5.10
- Apache tomcat 8.5.26
- Apache tomcat 8.5.4
- Apache tomcat 9.0.0
- Apache tomcat 8.5.37
- Apache tomcat 8.5.21
- Apache tomcat 8.5.5
- Apache tomcat 8.5.9
- Apache tomcat 9.0.1
- Apache tomcat 8.5.34
- Apache tomcat 8.5.20
- Apache tomcat 8.5.2
- Apache tomcat 8.5.35
- Apache tomcat 8.5.23
- Apache tomcat 8.5.3
- Apache tomcat 8.5.22
- Apache tomcat 8.5.0
- Apache tomcat 8.5.16
- Apache tomcat 8.5.1
- Apache tomcat 8.5.11
- Apache tomcat 8.5.27
- Apache tomcat 9.0.14
- Apache tomcat 9.0.8
- Apache tomcat 8.5.29
- Apache tomcat 9.0.9
- Apache tomcat 8.5.28
- Apache tomcat 8.5.18
- Apache tomcat 8.5.19
- Apache tomcat 8.5.12
- Apache tomcat 8.5.17
- Apache tomcat 8.5.32
- Apache tomcat 9.0.10
- Apache tomcat 9.0.6
- Apache tomcat 9.0.11
- Apache tomcat 9.0.12
- Apache tomcat 9.0.7
- Apache tomcat 8.5.14
- Apache tomcat 8.5.8
DOS:DIGIUM-PJSIP-DOS - DOS: Digium Asterisk PJSIP In-Dialog MESSAGE Request Denial-of-Service
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Digium Asterisk. A successful attack can lead to Denial of Service condition.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Digium asterisk 13.4.0
- Digium asterisk 15.7.0
- Digium asterisk 13.21.0
- Digium asterisk 15.1.4
- Digium asterisk 13.11.2
- Digium asterisk 13.0.2
- Digium asterisk 13.13.0
- Digium asterisk 15.7.1
- Digium asterisk 15.1.5
- Digium asterisk 13.0.1
- Digium asterisk 15.2.1
- Digium asterisk 13.17.1
- Digium asterisk 13.18.3
- Digium asterisk 13.0.0
- Digium asterisk 13.5.0
- Digium asterisk 13.19.2
- Digium asterisk 13.3.0
- Digium asterisk 13.13.1
- Digium asterisk 13.13
- Digium asterisk 13.8.2
- Digium asterisk 15.1.0
- Digium asterisk 13.19.1
- Digium asterisk 13.16.0
- Digium asterisk 13.8.1
- Digium asterisk 15.1.1
- Digium asterisk 13.7.2
- Digium asterisk 13.3.2
- Digium asterisk 13.10.0
- Digium asterisk 13.8.0
- Digium asterisk 15.1.2
- Digium asterisk 15.1.3
- Digium certified_asterisk 13.21
- Digium asterisk 15.4.1
- Digium asterisk 15.2.0
- Digium asterisk 15.2.2
- Digium asterisk 15.4.0
- Digium asterisk 13.23.0
- Digium asterisk 13.12.1
- Digium asterisk 13.11.0
- Digium asterisk 13.15.0
- Digium asterisk 15.0.0
- Digium asterisk 13.17.0
- Digium asterisk 13.12.0
- Digium asterisk 13.18.2
- Digium asterisk 13.15.1
- Digium asterisk 13.18.1
- Digium asterisk 16.1.0
- Digium asterisk 15.6.2
- Digium asterisk 13.20.0
- Digium asterisk 13.9.0
- Digium asterisk 13.18.0
- Digium asterisk 16.2.0
- Digium asterisk 13.3.1
- Digium asterisk 13.9.1
- Digium asterisk 13.1.0
- Digium asterisk 16.2.1
- Digium asterisk 15.6.0
- Digium asterisk 15.3.0
- Digium asterisk 13.19.0
- Digium asterisk 13.14.1
- Digium asterisk 13.1.1
- Digium asterisk 13.12
- Digium asterisk 13.6.0
- Digium asterisk 15.5.0
- Digium asterisk 13.12.2
- Digium asterisk 13.14.0
- Digium asterisk 13.18.5
- Digium asterisk 13.22.0
- Digium asterisk 13.18.4
- Digium asterisk 13.2.1
- Digium asterisk 16.0.0
- Digium asterisk 13.17.2
- Digium asterisk 13.2.0
- Digium asterisk 13.7.0
- Digium asterisk 16.0.1
- Digium asterisk 13.21.1
- Digium asterisk 13.11.1
- Digium asterisk 13.7.1