Uncontrolled Search-Path Element in safe_asterisk script may allow local privilege escalation : (GHSA-v9q8-9j8m-5xwp)
Remote DoS and possible RCE in asterisk/res/res_stir_shaken/verification.c : (GHSA-mrq5-74j5-f5cr)
cli_permissions.conf: deny option does not work for disallowing shell commands : (GHSA-c7p6-7mvq-8jq2)
Using malformed From header can forge identity with “;” or NULL in name portion : (GHSA-2grh-7mhv-fcfw)
Path traversal via AMI ListCategories allows access to outside files: (GHSA-33×6-fj46-6rfh)