Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-20951

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-03 Nov, 2022 | 19:26
Updated At-25 Oct, 2024 | 16:05
Rejected At-
Credits

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:03 Nov, 2022 | 19:26
Updated At:25 Oct, 2024 | 16:05
Rejected At:
▼CVE Numbering Authority (CNA)

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco BroadWorks
Versions
Affected
  • 24.0 ap375672
  • 24.0 ap375655
  • 24.0 ap376979
  • 24.0 ap379112
  • 24.0 ap379588
  • 24.0 ap378485
  • 24.0 ap376934
  • 24.0 ap379533
  • 24.0 ap374230
  • 24.0 ap378382
  • 24.0 ap375720
  • 24.0 ap378575
  • 24.0 ap378248
  • 24.0 ap378990
  • 24.0 ap378425
  • 24.0 ap377319
  • 24.0 ap378818
  • 24.0 ap375453
  • 24.0 ap376317
  • 24.0 ap376677
  • 24.0 ap375688
  • 24.0 ap377147
  • 24.0 ap376945
  • 24.0 ap377517
  • 24.0 ap376205
  • 24.0 ap378257
  • 24.0 ap378471
  • 24.0 ap376669
  • 24.0 ap375756
  • 24.0 ap378440
  • 24.0 ap376486
  • 24.0 ap378920
  • 24.0 ap375734
  • 24.0 ap378144
  • 24.0 ap375036
  • 24.0 ap375624
  • 24.0 ap378882
  • 24.0 ap376531
  • 24.0 ap375804
  • 24.0 ap376137
  • 24.0 ap377378
  • 24.0 ap376844
  • 24.0 ap376696
  • 24.0 ap378599
  • 24.0 ap378880
  • 24.0 ap374530
  • 24.0 ap375369
  • 24.0 ap376147
  • 24.0 ap376140
  • 24.0 ap379501
  • 24.0 ap378150
  • 24.0 ap375100
  • 24.0 ap376622
  • 24.0 ap379339
  • 24.0 ap377163
  • 24.0 ap375464
  • 24.0 ap376023
  • 24.0 ap378164
  • 24.0 ap378154
  • 24.0 ap377068
  • 24.0 ap377177
  • 24.0 ap377091
  • 24.0 ap377515
  • 24.0 ap379190
  • 24.0 ap378595
  • 24.0 ap374832
  • 24.0 ap367206
  • 24.0 ap377868
  • 24.0 ap378902
  • 24.0 ap375210
  • 24.0 ap375353
  • 24.0 ap376098
  • 24.0 ap378383
  • 24.0 ap379122
  • 24.0 ap376710
  • 24.0 ap376602
  • 24.0 ap378535
  • 24.0 ap377729
  • 24.0 ap375990
  • 24.0 ap375748
  • 24.0 ap376935
  • 24.0 ap376426
  • 24.0 ap375743
  • 24.0 ap379109
  • 24.0 ap378080
  • 24.0 ap375449
  • 24.0 ap375922
  • 24.0 ap377984
  • 24.0 ap379391
  • 24.0 ap379378
  • 24.0 ap376512
  • 24.0 ap376956
  • 24.0 ap369855
  • 24.0 ap379098
  • 24.0 ap376736
  • 24.0 ap377674
  • 24.0 ap375625
  • 24.0 ap378393
  • 24.0 ap376620
  • 24.0 ap372799
  • 24.0 ap378976
  • 24.0 ap376989
  • 24.0 ap378862
  • 24.0 ap378242
  • 24.0 ap375489
  • 24.0 ap379475
  • 24.0 ap376820
  • 24.0 ap375533
  • 24.0 ap376308
  • 24.0 ap376798
  • 24.0 ap375661
  • 24.0 ap378953
  • 24.0 ap371233
  • 24.0 ap377628
  • 24.0 ap375266
  • 24.0 ap376984
  • 24.0 ap375021
  • 24.0 ap377966
  • 24.0 ap375484
  • 24.0 ap378436
  • 24.0 ap378886
  • 24.0 ap375709
  • 24.0 ap376267
  • 24.0 ap375514
  • 24.0 ap377743
  • 24.0 ap377878
  • 24.0 ap378308
  • 24.0 ap379487
  • 24.0 ap376038
  • 24.0 ap377802
  • 24.0 ap376507
  • 24.0 ap377630
  • 24.0 ap378913
  • 24.0 ap376252
  • 24.0 ap376407
  • 24.0 ap376410
  • 24.0 ap376523
  • 24.0 ap375342
  • 24.0 ap375304
  • 24.0 ap378553
  • 24.0 ap375205
  • 24.0 ap376889
  • 24.0 ap376529
  • 24.0 ap375214
  • 24.0 ap377888
  • 24.0 ap377913
  • 24.0 ap376024
  • 24.0 ap378390
  • 24.0 ap375382
  • 24.0 ap379395
  • 24.0 ap377120
  • 24.0 ap378400
  • 24.0 ap376878
  • 24.0 ap377723
  • 24.0 ap374691
  • 24.0 ap379346
  • 24.0 ap378218
  • 24.0 ap376842
  • 24.0 ap374270
  • 24.0 ap376000
  • 24.0 ap376702
  • 24.0 ap377497
  • 24.0 ap375018
  • 24.0 ap378506
  • 24.0 ap377412
  • 24.0 ap375959
  • 24.0 ap379016
  • 24.0 ap379438
  • 24.0 ap378995
  • 24.0 ap378258
  • 24.0 ap378574
  • 24.0 ap375711
  • 24.0 ap376809
  • 24.0 ap375634
  • 24.0 ap375646
  • 24.0 ap375488
  • 24.0 ap377555
  • 24.0 ap375293
  • 24.0 ap378322
  • 24.0 ap378029
  • 24.0 ap379373
  • 24.0 ap377737
  • 24.0 ap378010
  • 24.0 ap378481
  • 24.0 ap376721
  • 24.0 ap375860
  • 24.0 ap378332
  • 24.0 ap379389
  • 24.0 ap377983
  • 24.0 ap378866
  • 24.0 ap377399
  • 24.0 ap376722
  • 24.0 ap379474
  • 24.0 ap378070
  • 24.0 ap376670
  • 24.0 ap375207
  • 24.0 ap376100
  • 24.0 ap378122
  • 24.0 ap376012
  • 24.0 ap375828
  • 24.0 ap378827
  • 24.0 ap376787
  • 24.0 ap376414
  • 24.0 ap377786
  • 24.0 ap376485
  • 24.0 ap379069
  • 24.0 ap378863
  • 24.0 ap376298
  • 24.0 ap373564
  • 24.0 ap376429
  • 24.0 ap379449
  • 24.0 ap377485
  • 24.0 ap378051
  • 24.0 ap375849
  • 24.0 ap376099
  • 24.0 ap378234
  • 24.0 ap377033
  • 24.0 ap377079
  • 24.0 ap375950
  • 24.0 ap375412
  • 24.0 ap375757
  • 24.0 ap376762
  • 24.0 ap376445
  • 24.0 ap379515
  • 24.0 ap375351
  • 24.0 ap375273
  • 24.0 ap378896
  • 24.0 ap379199
  • 24.0 ap374803
  • 24.0 ap375685
  • 24.0 ap375270
  • 24.0 ap370326
  • 24.0 ap375603
  • 24.0 ap376802
  • 24.0 ap376704
  • 24.0 ap379423
  • 24.0 ap376001
  • 24.0 ap377508
  • 24.0 ap375989
  • 24.0 ap376699
  • 24.0 ap377012
  • 24.0 ap379532
  • 24.0 ap378141
  • 24.0 ap375949
  • 24.0 ap375996
  • 24.0 ap378087
  • 24.0 ap378178
  • 24.0 ap375862
  • 24.0 ap376042
  • 24.0 ap378079
  • 24.0 ap379390
  • 24.0 ap378970
  • 24.0 ap375908
  • 24.0 ap378019
  • 24.0 ap377329
  • 24.0 ap376356
  • 24.0 ap377908
  • 24.0 ap377751
  • 24.0 ap377581
  • 24.0 ap375902
  • 24.0 ap356141
  • 24.0 ap358290
  • 24.0 ap362693
  • 24.0 ap370935
  • 24.0 ap372508
  • 24.0 ap372932
  • 24.0 ap375289
  • 24.0 ap375291
  • 24.0 ap375317
  • 24.0 ap375370
  • 24.0 ap375398
  • 24.0 ap375409
  • 24.0 ap375430
  • 24.0 ap375432
  • 24.0 ap375465
  • 24.0 ap375466
  • 24.0 ap375469
  • 24.0 ap375502
  • 24.0 ap375518
  • 24.0 ap375522
  • 24.0 ap375539
  • 24.0 ap375785
  • 24.0 ap375920
  • 24.0 ap376156
  • 24.0 ap376189
  • 24.0 ap376213
  • 24.0 ap376218
  • 24.0 ap376340
  • 24.0 ap376384
  • 24.0 ap376541
  • 24.0 ap376652
  • 24.0 ap376666
  • 24.0 ap376668
  • 24.0 ap376682
  • 24.0 ap376689
  • 24.0 ap376695
  • 24.0 ap376752
  • 24.0 ap376818
  • 24.0 ap376873
  • 24.0 ap377023
  • 24.0 ap377037
  • 24.0 ap377050
  • 24.0 ap377175
  • 24.0 ap377229
  • 24.0 ap377384
  • 24.0 ap377423
  • 24.0 ap377496
  • 24.0 ap377516
  • 24.0 ap377538
  • 24.0 ap377569
  • 24.0 ap377651
  • 24.0 ap377687
  • 24.0 ap377718
  • 24.0 ap377727
  • 24.0 ap377757
  • 24.0 ap377779
  • 24.0 ap377792
  • 24.0 ap377799
  • 24.0 ap378014
  • 24.0 ap378119
  • 24.0 ap378140
  • 24.0 ap378142
  • 24.0 ap378153
  • 24.0 ap378165
  • 24.0 ap378168
  • 24.0 ap378227
  • 24.0 ap378259
  • 24.0 ap378372
  • 24.0 ap378415
  • 24.0 ap378419
  • 24.0 ap378437
  • 24.0 ap378509
  • 24.0 ap378545
  • 24.0 ap378581
  • 24.0 ap378585
  • 24.0 ap378823
  • 24.0 ap378904
  • 24.0 ap378952
  • 24.0 ap378966
  • 24.0 ap378987
  • 24.0 ap379080
  • 24.0 ap379085
  • 24.0 ap379091
  • 24.0 ap379140
  • 24.0 ap379152
  • 24.0 ap379167
  • 24.0 ap379168
  • 24.0 ap379187
  • 24.0 ap379331
  • 24.0 ap379411
  • 24.0 ap379427
  • 24.0 ap379482
  • 24.0 ap379531
  • 24.0 ap379535
  • 24.0 ap379565
  • 24.0 ap379587
  • 24.0 ap379600
  • 24.0 ap379606
  • 24.0 ap379608
  • 24.0 ap379611
  • 24.0 ap379616
  • 24.0 ap379627
  • 24.0 ap379635
  • 24.0 ap379694
  • 24.0 ap379701
  • 24.0 ap379752
  • 24.0 ap379760
  • 24.0 ap379762
  • 24.0 ap379764
  • 24.0 ap379780
  • 24.0 ap379781
  • 24.0 ap379782
  • 24.0 ap379830
  • 24.0 ap379839
  • 24.0 ap379848
  • 24.0 ap379855
  • 24.0 ap379874
  • 24.0 ap379884
  • 24.0 ap379889
  • 24.0 ap379892
  • 24.0 ap379903
  • 24.0 ap378203
  • 24.0 ap379008
  • 24.0 ap379795
  • 24.0 ap379838
  • 24.0 ap379847
  • 24.0 ap379890
  • 24.0 ap379921
  • 24.0 ap379925
  • 24.0 ap379934
  • 24.0 ap379957
  • 24.0 ap379963
  • 24.0 ap379972
  • 24.0 ap380059
  • 24.0 ap380099
  • 24.0 ap380109
  • 24.0 ap380137
  • 24.0 ap380143
  • 24.0 ap380161
  • 24.0 ap380176
  • 24.0 ap380180
  • 24.0 ap380181
  • 24.0 ap380187
  • 24.0 ap380196
  • 24.0 ap380204
  • 24.0 ap380239
  • 24.0 ap380249
  • 24.0 ap380256
  • 24.0 ap380264
  • 24.0 ap380269
  • 24.0 ap380270
  • 24.0 ap380281
  • 24.0 ap380282
  • 24.0 ap380355
  • 24.0 ap380371
  • 24.0 ap380375
  • 24.0 ap380396
  • 24.0 ap380450
  • 24.0 ap380465
  • 24.0 ap380473
  • 24.0 ap380501
  • 24.0 ap380506
  • 24.0 ap380543
  • 24.0 ap380581
  • 24.0 ap380595
  • 24.0 ap380637
  • 24.0 ap380692
  • 24.0 ap380758
  • 24.0 ap380762
  • 24.0 ap380766
  • 24.0 ap381358
  • 24.0 ap382200
  • 24.0 ap381767
  • 24.0 ap382744
  • 24.0 ap381657
  • 24.0 ap381609
  • 24.0 ap382951
  • 24.0 ap381848
  • 24.0 ap380849
  • 24.0 ap381809
  • 24.0 ap381826
  • 24.0 ap381622
  • 24.0 ap381654
  • 24.0 ap374211
  • 24.0 ap381002
  • 24.0 ap382750
  • 24.0 ap382039
  • 24.0 ap381874
  • 24.0 ap383534
  • 24.0 ap381775
  • 24.0 ap382916
  • 24.0 ap380939
  • 24.0 ap383002
  • 24.0 ap382206
  • 24.0 ap381247
  • 24.0 ap381666
  • 24.0 ap381825
  • 24.0 ap381952
  • 24.0 ap382277
  • 24.0 ap380936
  • 24.0 ap380985
  • 24.0 ap382468
  • 24.0 ap382094
  • 24.0 ap381971
  • 24.0 ap383536
  • 24.0 ap381970
  • 24.0 ap381271
  • 24.0 ap381292
  • 24.0 ap381621
  • 24.0 ap379049
  • 24.0 ap380840
  • 24.0 ap381600
  • 24.0 ap382526
  • 24.0 ap382462
  • 24.0 ap380613
  • 24.0 ap381596
  • 24.0 ap380779
  • 24.0 ap382615
  • 24.0 ap382170
  • 24.0 ap382164
  • 24.0 ap382189
  • 24.0 ap381357
  • 24.0 ap381348
  • 24.0 ap382495
  • 24.0 ap382042
  • 24.0 ap382441
  • 24.0 ap381575
  • 24.0 ap381936
  • 24.0 ap382994
  • 24.0 ap381623
  • 24.0 ap382236
  • 24.0 ap382676
  • 24.0 ap382673
  • 24.0 ap380998
  • 24.0 ap382045
  • 24.0 ap382167
  • 24.0 ap381975
  • 24.0 ap382668
  • 24.0 ap382053
  • 24.0 ap383710
  • 24.0 ap382740
  • 24.0 ap383459
  • 24.0 ap382692
  • 24.0 ap383737
  • 24.0 ap380045
  • 24.0 ap382195
  • 24.0 ap382057
  • 24.0 ap381243
  • 24.0 ap382160
  • 24.0 ap382445
  • 24.0 ap382246
  • 24.0 ap382958
  • 24.0 ap381854
  • 24.0 ap381604
  • 24.0 ap381091
  • 24.0 ap381079
  • 24.0 ap381527
  • 24.0 ap383772
  • 24.0 ap381004
  • 24.0 ap380737
  • 24.0 ap382253
  • 24.0 ap381721
  • 24.0 ap381322
  • 24.0 ap382098
  • 24.0 ap382677
  • 24.0 ap382169
  • 24.0 ap383696
  • 24.0 ap382258
  • 24.0 ap380751
  • 24.0 ap382262
  • 24.0 ap382267
  • 24.0 ap382192
  • 24.0 ap380128
  • 24.0 ap382656
  • 24.0 ap383779
  • 24.0 ap382194
  • 24.0 ap382691
  • 24.0 ap382372
  • 24.0 ap380771
  • 24.0 ap382155
  • 24.0 ap382484
  • 24.0 ap383902
  • 24.0 ap382362
  • 24.0 ap383788
  • 24.0 ap383771
  • 24.0 ap382836
  • 24.0 ap382240
  • 24.0 ap383700
  • 24.0 ap383597
  • 24.0 ap381108
  • 24.0 ap379012
  • 24.0 ap382709
  • 24.0 ap381078
  • 24.0 ap383505
  • 24.0 ap382977
  • 24.0 ap382912
  • 24.0 ap383569
  • 24.0 ap383105
  • 24.0 ap380537
  • 24.0 ap382935
  • 24.0 ap381616
  • 24.0 ap383519
  • 24.0 ap381410
  • 24.0 ap383573
  • 24.0 ap382959
  • 24.0 ap376010
  • 24.0 ap380051
  • 24.0 ap381506
  • 24.0 ap381732
  • 24.0 ap383492
  • 24.0 ap383089
  • 24.0 ap383172
  • 24.0 ap381624
  • 24.0 ap383547
  • 24.0 ap381584
  • 24.0 ap382945
  • 24.0 ap382594
  • 24.0 ap383494
  • 24.0 ap381611
  • 24.0 ap380739
  • 24.0 ap381574
  • 24.0 ap383390
  • 24.0 ap383538
  • 24.0 ap382838
  • 24.0 ap382252
  • 24.0 ap383518
  • 24.0 ap383326
  • 24.0 ap383463
  • 24.0 ap383391
  • 24.0 ap380052
  • 24.0 ap383352
  • 24.0 ap383064
  • 24.0 ap382488
  • 24.0 ap381615
  • 24.0 ap382952
  • 24.0 ap381055
  • 24.0 ap383466
  • 24.0 ap383178
  • 24.0 ap383515
  • 24.0 ap383681
  • 24.0 ap383377
  • 24.0 ap383327
  • 24.0 ap383123
  • 24.0 ap383346
  • 24.0 ap383331
  • 24.0 ap382993
  • 24.0 ap383147
  • 24.0 ap382487
  • 24.0 ap383170
  • 24.0 ap382929
  • 24.0 ap383717
  • 24.0 ap380782
  • 24.0 ap382954
  • 24.0 ap382527
  • 24.0 ap383754
  • 24.0 ap382969
  • 24.0 ap382965
  • 24.0 ap380970
  • 24.0 ap382515
  • 24.0 ap382463
  • 24.0 ap382976
  • 24.0 ap380837
  • 24.0 ap381878
  • 24.0 ap381031
  • 24.0 ap383338
  • 24.0 ap383119
  • 24.0 ap380802
  • 24.0 ap383168
  • 24.0 ap383297
  • 24.0 ap383188
  • 24.0 ap381285
  • 24.0 ap381257
  • 24.0 ap383247
  • 24.0 ap382186
  • 24.0 ap381418
  • 24.0 ap381515
  • 24.0 ap381570
  • 24.0 ap383511
  • 24.0 ap381367
  • 24.0 ap378603
  • 24.0 ap381366
  • 24.0 ap382456
  • 24.0 ap381412
  • 24.0 ap383567
  • 24.0 ap381548
  • 24.0 ap379397
  • 24.0 ap381518
  • 24.0 ap381341
  • 24.0 ap381498
  • 24.0 ap381507
  • 24.0 ap381339
  • 24.0 ap383302
  • 24.0 ap381398
  • 24.0 ap380775
  • 24.0 ap381526
  • 24.0 ap383908
  • 24.0 ap383821
  • 24.0 ap383781
  • 24.0 ap381334
  • 24.0 ap382689
  • 24.0 ap381215
  • 24.0 ap382646
  • 24.0 ap382493
  • 24.0 ap382300
  • 24.0 ap381001
  • 24.0 ap380697
  • 24.0 ap382412
  • 24.0 ap381305
  • 24.0 ap381523
  • 24.0 ap380535
  • 24.0 ap381543
  • 24.0 ap381088
  • 24.0 ap382631
  • 24.0 ap379046
  • 24.0 ap380167
  • 24.0 ap381308
  • 24.0 ap381340
  • 24.0 ap380783
  • 24.0 ap383603
  • 24.0 ap381300
  • 24.0 ap381805
  • 24.0 ap381733
  • 24.0 ap381384
  • 24.0 ap373571
  • 24.0 ap380042
  • 24.0 ap381840
  • 24.0 ap381951
  • 24.0 ap382856
  • 24.0 ap383524
  • 24.0 ap380047
  • 24.0 ap381857
  • 24.0 ap383520
  • 24.0 ap381956
  • 24.0 ap381655
  • 24.0 ap381569
  • 24.0 ap379954
  • 24.0 ap383716
  • 24.0 ap383775
  • 24.0 ap383838
  • 24.0 ap383905
  • 24.0 ap383909
  • 24.0 ap383933
  • 24.0 ap383943
  • 24.0 ap383952
  • 24.0 ap383955
  • 24.0 ap383968
  • 24.0 ap383979
  • 24.0 ap384000
  • 24.0 ap384115
  • 24.0 ap383989
  • 24.0 ap384002
  • 24.0 ap383782
  • 24.0 ap383992
  • 24.0 ap383973
  • 24.0 ap383309
  • 24.0 ap383514
  • 24.0 ap383815
  • 24.0 ap383899
  • 24.0 ap383983
  • 24.0 ap383994
  • 24.0 ap383998
  • 24.0 ap384015
  • 24.0 ap384023
  • 24.0 ap384034
  • 24.0 ap384120
  • 24.0 ap384127
  • 24.0 ap384129
  • 24.0 ap384134
  • 24.0 ap384137
  • 24.0 ap384138
  • 24.0 ap384145
  • 24.0 ap384151
  • 24.0 ap384163
  • 24.0 ap384173
  • 24.0 ap384177
  • 24.0 ap384179
  • 24.0 ap384185
  • 24.0 ap384191
  • 24.0 ap384194
  • 24.0 ap384209
  • 24.0 ap384211
  • 24.0 ap384220
  • 24.0 ap384234
  • 24.0 ap384309
  • 24.0 ap384317
  • 24.0 ap381051
  • 24.0 ap381081
  • 24.0 ap382225
  • 24.0 ap382717
  • 24.0 ap382824
  • 24.0 ap382841
  • 24.0 ap382857
  • 24.0 ap382873
  • 24.0 ap382894
  • 24.0 ap384232
  • 24.0 ap384239
  • 24.0 ap384320
  • 24.0 ap384339
  • 24.0 ap384342
  • 24.0 ap384344
  • 24.0 ap384345
  • 24.0 ap384351
  • 24.0 ap384357
  • 24.0 ap384358
  • 24.0 ap384361
  • 24.0 ap384365
  • 24.0 ap384367
  • 24.0 ap384372
  • 24.0 ap384374
  • 24.0 ap384377
  • 24.0 ap384386
  • 24.0 ap384389
  • 24.0 ap384395
  • 24.0 ap384423
  • 24.0 ap384428
  • 24.0 ap384429
  • 24.0 ap384430
  • 24.0 ap384431
  • 24.0 ap384434
  • 24.0 ap384439
  • 24.0 ap384441
  • 24.0 ap384446
  • 24.0 ap384448
  • 24.0 ap384449
  • 24.0 ap384455
  • 24.0 ap384462
  • 24.0 ap384468
  • 24.0 ap384471
  • 24.0 ap384474
  • 24.0 ap384480
  • 24.0 ap384543
  • 24.0 ap384589
  • 24.0 ap384594
  • 24.0 ap384620
  • 24.0 ap384622
  • 24.0 ap384627
  • 24.0 ap384629
  • 24.0 ap384636
  • 24.0 ap384641
  • 24.0 ap384643
  • 24.0 ap384650
  • 23.0
  • 23.0 ap380204
  • 23.0 ap380281
  • 23.0 ap380355
  • 23.0 ap380375
  • 23.0 ap380391
  • 23.0 ap380396
  • 23.0 ap366748
  • 23.0 ap374310
  • 23.0 ap375293
  • 23.0 ap371233
  • 23.0 ap381051
  • 23.0 ap365558
  • 23.0 ap379795
  • 23.0 ap373098
  • 23.0 ap382864
  • 23.0 ap364705
  • 23.0 ap375539
  • 23.0 ap382358
  • 23.0 ap374143
  • 23.0 ap367292
  • 23.0 ap375289
  • 23.0 ap375624
  • 23.0 ap375317
  • 23.0 ap362261
  • 23.0 ap382281
  • 23.0 ap367434
  • 23.0 ap363641
  • 23.0 ap376661
  • 23.0 ap382262
  • 23.0 ap380691
  • 23.0 ap383569
  • 23.0 ap368179
  • 23.0 ap375601
  • 23.0 ap382206
  • 23.0 ap383829
  • 23.0 ap377319
  • 23.0 ap381081
  • 23.0 ap363869
  • 23.0 ap367895
  • 23.0 ap383902
  • 23.0 ap372017
  • 23.0 ap383519
  • 23.0 ap375345
  • 23.0 ap374085
  • 23.0 ap367488
  • 23.0 ap382236
  • 23.0 ap363192
  • 23.0 ap371974
  • 23.0 ap367223
  • 23.0 ap373017
  • 23.0 ap373752
  • 23.0 ap373882
  • 23.0 ap373861
  • 23.0 ap365531
  • 23.0 ap373870
  • 23.0 ap372929
  • 23.0 ap373952
  • 23.0 ap374037
  • 23.0 ap368214
  • 23.0 ap366264
  • 23.0 ap373769
  • 23.0 ap383779
  • 23.0 ap374583
  • 23.0 ap373009
  • 23.0 ap371300
  • 23.0 ap374125
  • 23.0 ap367985
  • 23.0 ap364367
  • 23.0 ap362578
  • 23.0 ap373871
  • 23.0 ap383785
  • 23.0 ap380766
  • 23.0 ap365598
  • 23.0 ap380849
  • 23.0 ap373912
  • 23.0 ap366334
  • 23.0 ap374421
  • 23.0 ap380692
  • 23.0 ap380758
  • 23.0 ap374305
  • 23.0 ap380771
  • 23.0 ap367992
  • 23.0 ap374055
  • 23.0 ap367547
  • 23.0 ap368000
  • 23.0 ap366366
  • 23.0 ap365227
  • 23.0 ap372015
  • 23.0 ap372012
  • 23.0 ap374668
  • 23.0 ap383788
  • 23.0 ap351263
  • 23.0 ap374715
  • 23.0 ap374691
  • 23.0 ap370792
  • 23.0 ap364467
  • 23.0 ap365701
  • 23.0 ap374255
  • 23.0 ap381357
  • 23.0 ap374311
  • 23.0 ap374162
  • 23.0 ap363644
  • 23.0 ap373754
  • 23.0 ap373301
  • 23.0 ap373182
  • 23.0 ap374226
  • 23.0 ap377423
  • 23.0 ap369489
  • 23.0 ap373294
  • 23.0 ap383524
  • 23.0 ap383302
  • 23.0 ap375902
  • 23.0 ap376010
  • 23.0 ap382487
  • 23.0 ap371314
  • 23.0 ap371327
  • 23.0 ap371285
  • 23.0 ap371368
  • 23.0 ap371167
  • 23.0 ap374454
  • 23.0 ap383538
  • 23.0 ap374109
  • 23.0 ap374639
  • 23.0 ap371099
  • 23.0 ap369731
  • 23.0 ap371310
  • 23.0 ap383490
  • 23.0 ap374315
  • 23.0 ap374249
  • 23.0 ap374493
  • 23.0 ap374165
  • 23.0 ap374361
  • 23.0 ap373330
  • 23.0 ap369928
  • 23.0 ap374296
  • 23.0 ap371319
  • 23.0 ap374210
  • 23.0 ap372116
  • 23.0 ap371748
  • 23.0 ap374472
  • 23.0 ap372453
  • 23.0 ap371432
  • 23.0 ap372345
  • 23.0 ap371868
  • 23.0 ap372121
  • 23.0 ap383710
  • 23.0 ap372995
  • 23.0 ap373511
  • 23.0 ap372873
  • 23.0 ap370427
  • 23.0 ap371209
  • 23.0 ap355298
  • 23.0 ap371811
  • 23.0 ap373589
  • 23.0 ap366525
  • 23.0 ap381596
  • 23.0 ap383567
  • 23.0 ap372533
  • 23.0 ap372922
  • 23.0 ap370538
  • 23.0 ap371268
  • 23.0 ap383681
  • 23.0 ap374498
  • 23.0 ap373004
  • 23.0 ap371269
  • 23.0 ap371456
  • 23.0 ap366201
  • 23.0 ap360464
  • 23.0 ap362035
  • 23.0 ap375383
  • 23.0 ap375770
  • 23.0 ap372607
  • 23.0 ap371259
  • 23.0 ap374794
  • 23.0 ap366296
  • 23.0 ap374892
  • 23.0 ap367007
  • 23.0 ap365754
  • 23.0 ap374785
  • 23.0 ap352402
  • 23.0 ap372079
  • 23.0 ap375309
  • 23.0 ap366797
  • 23.0 ap366335
  • 23.0 ap375465
  • 23.0 ap374609
  • 23.0 ap381366
  • 23.0 ap370383
  • 23.0 ap371722
  • 23.0 ap362749
  • 23.0 ap367323
  • 23.0 ap374820
  • 23.0 ap369763
  • 23.0 ap381657
  • 23.0 ap368517
  • 23.0 ap372455
  • 23.0 ap365058
  • 23.0 ap370362
  • 23.0 ap381358
  • 23.0 ap374723
  • 23.0 ap375353
  • 23.0 ap375370
  • 23.0 ap380201
  • 23.0 ap380041
  • 23.0 ap361414
  • 23.0 ap380507
  • 23.0 ap368643
  • 23.0 ap379140
  • 23.0 ap379461
  • 23.0 ap379501
  • 23.0 ap377147
  • 23.0 ap376261
  • 23.0 ap379417
  • 23.0 ap372207
  • 23.0 ap368743
  • 23.0 ap370464
  • 23.0 ap353137
  • 23.0 ap373016
  • 23.0 ap364518
  • 23.0 ap361651
  • 23.0 ap379339
  • 23.0 ap374711
  • 23.0 ap371091
  • 23.0 ap370763
  • 23.0 ap366610
  • 23.0 ap371021
  • 23.0 ap366275
  • 23.0 ap370909
  • 23.0 ap381243
  • 23.0 ap381271
  • 23.0 ap379449
  • 23.0 ap371052
  • 23.0 ap381247
  • 23.0 ap383603
  • 23.0 ap380249
  • 23.0 ap382195
  • 23.0 ap380130
  • 23.0 ap373571
  • 23.0 ap382668
  • 23.0 ap382493
  • 23.0 ap380269
  • 23.0 ap380232
  • 23.0 ap364371
  • 23.0 ap377483
  • 23.0 ap383716
  • 23.0 ap383775
  • 23.0 ap383909
  • 23.0 ap383913
  • 23.0 ap383943
  • 23.0 ap383952
  • 23.0 ap383955
  • 23.0 ap383979
  • 23.0 ap383838
  • 23.0 ap384023
  • 23.0 ap381781
  • 23.0 ap383717
  • 23.0 ap383797
  • 23.0 ap383815
  • 23.0 ap383998
  • 23.0 ap384015
  • 23.0 ap384127
  • 23.0 ap384131
  • 23.0 ap384151
  • 23.0 ap384173
  • 23.0 ap384179
  • 23.0 ap384185
  • 23.0 ap384211
  • 23.0 ap384220
  • 23.0 ap384227
  • 23.0 ap384245
  • 23.0 ap384344
  • 23.0 ap363366
  • 23.0 ap364258
  • 23.0 ap364844
  • 23.0 ap365170
  • 23.0 ap365576
  • 23.0 ap365858
  • 23.0 ap366221
  • 23.0 ap366294
  • 23.0 ap365801
  • 23.0 ap366170
  • 23.0 ap364925
  • 23.0 ap366295
  • 23.0 ap366346
  • 23.0 ap366348
  • 23.0 ap365171
  • 23.0 ap364295
  • 23.0 ap364559
  • 23.0 ap366118
  • 23.0 ap366252
  • 23.0 ap363815
  • 23.0 ap363729
  • 23.0 ap365390
  • 23.0 ap364932
  • 23.0 ap365239
  • 23.0 ap365759
  • 23.0 ap366211
  • 23.0 ap366290
  • 23.0 ap365223
  • 23.0 ap366117
  • 23.0 ap365730
  • 23.0 ap366299
  • 23.0 ap366261
  • 23.0 ap365889
  • 23.0 ap366181
  • 23.0 ap365115
  • 23.0 ap364048
  • 23.0 ap366298
  • 23.0 ap364699
  • 23.0 ap345032
  • 23.0 ap362683
  • 23.0 ap363361
  • 23.0 ap352969
  • 23.0 ap359103
  • 23.0 ap366375
  • 23.0 ap366870
  • 23.0 ap366912
  • 23.0 ap366624
  • 23.0 ap367109
  • 23.0 ap366397
  • 23.0 ap354354
  • 23.0 ap349850
  • 23.0 ap366880
  • 23.0 ap360007
  • 23.0 ap366744
  • 23.0 ap366747
  • 23.0 ap366656
  • 23.0 ap367206
  • 23.0 ap362771
  • 23.0 ap367291
  • 23.0 ap366916
  • 23.0 ap367207
  • 23.0 ap363363
  • 23.0 ap366959
  • 23.0 ap351530
  • 23.0 ap361116
  • 23.0 ap366898
  • 23.0 ap357608
  • 23.0 ap361533
  • 23.0 ap366827
  • 23.0 ap352962
  • 23.0 ap366412
  • 23.0 ap369295
  • 23.0 ap366358
  • 23.0 ap366677
  • 23.0 ap366882
  • 23.0 ap366972
  • 23.0 ap366486
  • 23.0 ap366803
  • 23.0 ap358290
  • 23.0 ap363265
  • 23.0 ap363128
  • 23.0 ap366701
  • 23.0 ap366373
  • 23.0 ap369674
  • 23.0 ap369206
  • 23.0 ap369065
  • 23.0 ap368327
  • 23.0 ap368308
  • 23.0 ap368632
  • 23.0 ap367290
  • 23.0 ap369302
  • 23.0 ap368419
  • 23.0 ap369501
  • 23.0 ap369219
  • 23.0 ap368601
  • 23.0 ap368604
  • 23.0 ap368706
  • 23.0 ap368461
  • 23.0 ap368612
  • 23.0 ap368552
  • 23.0 ap369529
  • 23.0 ap369748
  • 23.0 ap368218
  • 23.0 ap368913
  • 23.0 ap369607
  • 23.0 ap369693
  • 23.0 ap368957
  • 23.0 ap368510
  • 23.0 ap368445
  • 23.0 ap369106
  • 23.0 ap369257
  • 23.0 ap368987
  • 23.0 ap369150
  • 23.0 ap368695
  • 23.0 ap368167
  • 23.0 ap370361
  • 23.0 ap367969
  • 23.0 ap367367
  • 23.0 ap369434
  • 23.0 ap369132
  • 23.0 ap367678
  • 23.0 ap367517
  • 23.0 ap369863
  • 23.0 ap369227
  • 23.0 ap368970
  • 23.0 ap369454
  • 23.0 ap367332
  • 23.0 ap368067
  • 23.0 ap369641
  • 23.0 ap367794
  • 23.0 ap369934
  • 23.0 ap370196
  • 23.0 ap367358
  • 23.0 ap367453
  • 23.0 ap369881
  • 23.0 ap367732
  • 23.0 ap367294
  • 23.0 ap367646
  • 23.0 ap367874
  • 23.0 ap370344
  • 23.0 ap367524
  • 23.0 ap368153
  • 23.0 ap368087
  • 23.0 ap367820
  • 23.0 ap368180
  • 23.0 ap367726
  • 23.0 ap370103
  • 23.0 ap367974
  • 23.0 ap367396
  • 23.0 ap367340
  • 23.0 ap367293
  • 23.0 ap369855
  • 23.0 ap368140
  • 23.0 ap367298
  • 23.0 ap367998
  • 23.0 ap372337
  • 23.0 ap372706
  • 23.0 ap368032
  • 23.0 ap367906
  • 23.0 ap370138
  • 23.0 ap372380
  • 23.0 ap372246
  • 23.0 ap370193
  • 23.0 ap372643
  • 23.0 ap372560
  • 23.0 ap367513
  • 23.0 ap369931
  • 23.0 ap368195
  • 23.0 ap372243
  • 23.0 ap368216
  • 23.0 ap369929
  • 23.0 ap367365
  • 23.0 ap367782
  • 23.0 ap367675
  • 23.0 ap372757
  • 23.0 ap372389
  • 23.0 ap372799
  • 23.0 ap372641
  • 23.0 ap371050
  • 23.0 ap372338
  • 23.0 ap372623
  • 23.0 ap372422
  • 23.0 ap372033
  • 23.0 ap372178
  • 23.0 ap371516
  • 23.0 ap372351
  • 23.0 ap372708
  • 23.0 ap372100
  • 23.0 ap372504
  • 23.0 ap371961
  • 23.0 ap370590
  • 23.0 ap370544
  • 23.0 ap372599
  • 23.0 ap371610
  • 23.0 ap371836
  • 23.0 ap371343
  • 23.0 ap372674
  • 23.0 ap371202
  • 23.0 ap370911
  • 23.0 ap370817
  • 23.0 ap372043
  • 23.0 ap370802
  • 23.0 ap371725
  • 23.0 ap370437
  • 23.0 ap370926
  • 23.0 ap370884
  • 23.0 ap371681
  • 23.0 ap371366
  • 23.0 ap370952
  • 23.0 ap371281
  • 23.0 ap371436
  • 23.0 ap371153
  • 23.0 ap371033
  • 23.0 ap371977
  • 23.0 ap371627
  • 23.0 ap371155
  • 23.0 ap371134
  • 23.0 ap371295
  • 23.0 ap372152
  • 23.0 ap371760
  • 23.0 ap370627
  • 23.0 ap371583
  • 23.0 ap371546
  • 23.0 ap371770
  • 23.0 ap371437
  • 23.0 ap372091
  • 23.0 ap372163
  • 23.0 ap370737
  • 23.0 ap370908
  • 23.0 ap370465
  • 23.0 ap371587
  • 23.0 ap375133
  • 23.0 ap371682
  • 23.0 ap375266
  • 23.0 ap372099
  • 23.0 ap375254
  • 23.0 ap372016
  • 23.0 ap372177
  • 23.0 ap375242
  • 23.0 ap375206
  • 23.0 ap375291
  • 23.0 ap371775
  • 23.0 ap375196
  • 23.0 ap375688
  • 23.0 ap375382
  • 23.0 ap375634
  • 23.0 ap375654
  • 23.0 ap375449
  • 23.0 ap375321
  • 23.0 ap375685
  • 23.0 ap375509
  • 23.0 ap375719
  • 23.0 ap375720
  • 23.0 ap375464
  • 23.0 ap375625
  • 23.0 ap375441
  • 23.0 ap375709
  • 23.0 ap375343
  • 23.0 ap375533
  • 23.0 ap375672
  • 23.0 ap375545
  • 23.0 ap375264
  • 23.0 ap375661
  • 23.0 ap375646
  • 23.0 ap375238
  • 23.0 ap375304
  • 23.0 ap375097
  • 23.0 ap373664
  • 23.0 ap373562
  • 23.0 ap372932
  • 23.0 ap374339
  • 23.0 ap374265
  • 23.0 ap374230
  • 23.0 ap374430
  • 23.0 ap373102
  • 23.0 ap375655
  • 23.0 ap373777
  • 23.0 ap374113
  • 23.0 ap373015
  • 23.0 ap374971
  • 23.0 ap374803
  • 23.0 ap374677
  • 23.0 ap372974
  • 23.0 ap373117
  • 23.0 ap374312
  • 23.0 ap374354
  • 23.0 ap375018
  • 23.0 ap373018
  • 23.0 ap374506
  • 23.0 ap374588
  • 23.0 ap373950
  • 23.0 ap375038
  • 23.0 ap373480
  • 23.0 ap374238
  • 23.0 ap372845
  • 23.0 ap373564
  • 23.0 ap373482
  • 23.0 ap372994
  • 23.0 ap373137
  • 23.0 ap373108
  • 23.0 ap374977
  • 23.0 ap373034
  • 23.0 ap374324
  • 23.0 ap374031
  • 23.0 ap374093
  • 23.0 ap373732
  • 23.0 ap374507
  • 23.0 ap373684
  • 23.0 ap374356
  • 23.0 ap373820
  • 23.0 ap373104
  • 23.0 ap373954
  • 23.0 ap373644
  • 23.0 ap373899
  • 23.0 ap374822
  • 23.0 ap374254
  • 23.0 ap375069
  • 23.0 ap373918
  • 23.0 ap374557
  • 23.0 ap372854
  • 23.0 ap373647
  • 23.0 ap374838
  • 23.0 ap374330
  • 23.0 ap374799
  • 23.0 ap374428
  • 23.0 ap373008
  • 23.0 ap375936
  • 23.0 ap375862
  • 23.0 ap374994
  • 23.0 ap376041
  • 23.0 ap374895
  • 23.0 ap375793
  • 23.0 ap376088
  • 23.0 ap373046
  • 23.0 ap375937
  • 23.0 ap374680
  • 23.0 ap376181
  • 23.0 ap375797
  • 23.0 ap375003
  • 23.0 ap373763
  • 23.0 ap373539
  • 23.0 ap373111
  • 23.0 ap375734
  • 23.0 ap376117
  • 23.0 ap375743
  • 23.0 ap376087
  • 23.0 ap376179
  • 23.0 ap376100
  • 23.0 ap373299
  • 23.0 ap373303
  • 23.0 ap375908
  • 23.0 ap376356
  • 23.0 ap375984
  • 23.0 ap373318
  • 23.0 ap375865
  • 23.0 ap373196
  • 23.0 ap376038
  • 23.0 ap373257
  • 23.0 ap373285
  • 23.0 ap376218
  • 23.0 ap373438
  • 23.0 ap373212
  • 23.0 ap373391
  • 23.0 ap373315
  • 23.0 ap373271
  • 23.0 ap376509
  • 23.0 ap376252
  • 23.0 ap376602
  • 23.0 ap376752
  • 23.0 ap373452
  • 23.0 ap376429
  • 23.0 ap376860
  • 23.0 ap376710
  • 23.0 ap376410
  • 23.0 ap376577
  • 23.0 ap376633
  • 23.0 ap376298
  • 23.0 ap373189
  • 23.0 ap376426
  • 23.0 ap376873
  • 23.0 ap376668
  • 23.0 ap376407
  • 23.0 ap376670
  • 23.0 ap376485
  • 23.0 ap376642
  • 23.0 ap376652
  • 23.0 ap376523
  • 23.0 ap376656
  • 23.0 ap376620
  • 23.0 ap376531
  • 23.0 ap378025
  • 23.0 ap377412
  • 23.0 ap376504
  • 23.0 ap376762
  • 23.0 ap376541
  • 23.0 ap376671
  • 23.0 ap376844
  • 23.0 ap376701
  • 23.0 ap376614
  • 23.0 ap377578
  • 23.0 ap377496
  • 23.0 ap377715
  • 23.0 ap377508
  • 23.0 ap376416
  • 23.0 ap377409
  • 23.0 ap377778
  • 23.0 ap376355
  • 23.0 ap377866
  • 23.0 ap377516
  • 23.0 ap377644
  • 23.0 ap377755
  • 23.0 ap377540
  • 23.0 ap377497
  • 23.0 ap377523
  • 23.0 ap377581
  • 23.0 ap377727
  • 23.0 ap378436
  • 23.0 ap377515
  • 23.0 ap377674
  • 23.0 ap378400
  • 23.0 ap377566
  • 23.0 ap377494
  • 23.0 ap377799
  • 23.0 ap377779
  • 23.0 ap378165
  • 23.0 ap378332
  • 23.0 ap377757
  • 23.0 ap377908
  • 23.0 ap377802
  • 23.0 ap377999
  • 23.0 ap377984
  • 23.0 ap378134
  • 23.0 ap378545
  • 23.0 ap378863
  • 23.0 ap378882
  • 23.0 ap379016
  • 23.0 ap378599
  • 23.0 ap378218
  • 23.0 ap378164
  • 23.0 ap379085
  • 23.0 ap378880
  • 23.0 ap378334
  • 23.0 ap378862
  • 23.0 ap378425
  • 23.0 ap378259
  • 23.0 ap378970
  • 23.0 ap378153
  • 23.0 ap378585
  • 23.0 ap378509
  • 23.0 ap378393
  • 23.0 ap378079
  • 23.0 ap378404
  • 23.0 ap378471
  • 23.0 ap378966
  • 23.0 ap379049
  • 23.0 ap379012
  • 23.0 ap379080
  • 23.0 ap378865
  • 23.0 ap378140
  • 23.0 ap378574
  • 23.0 ap378440
  • 23.0 ap378055
  • 23.0 ap378823
  • 23.0 ap378603
  • 23.0 ap379397
  • 23.0 ap379153
  • 23.0 ap378953
  • 23.0 ap378866
  • 23.0 ap379008
  • 23.0 ap378924
  • 23.0 ap378581
  • 23.0 ap378999
  • 23.0 ap378161
  • 23.0 ap378080
  • 23.0 ap379493
  • 23.0 ap380161
  • 23.0 ap379046
  • 23.0 ap379874
  • 23.0 ap378391
  • 23.0 ap380239
  • 23.0 ap379951
  • 23.0 ap379772
  • 23.0 ap378419
  • 23.0 ap378257
  • 23.0 ap379775
  • 23.0 ap379838
  • 23.0 ap379531
  • 23.0 ap379888
  • 23.0 ap379167
  • 23.0 ap378485
  • 23.0 ap380167
  • 23.0 ap380099
  • 23.0 ap379847
  • 23.0 ap379098
  • 23.0 ap379972
  • 23.0 ap379438
  • 23.0 ap380143
  • 23.0 ap380187
  • 23.0 ap379326
  • 23.0 ap379427
  • 23.0 ap380045
  • 23.0 ap379848
  • 23.0 ap377384
  • 23.0 ap376984
  • 23.0 ap377042
  • 23.0 ap379890
  • 23.0 ap380128
  • 23.0 ap377149
  • 23.0 ap380446
  • 23.0 ap379694
  • 23.0 ap376988
  • 23.0 ap380270
  • 23.0 ap379780
  • 23.0 ap380371
  • 23.0 ap377225
  • 23.0 ap379752
  • 23.0 ap380137
  • 23.0 ap377045
  • 23.0 ap376989
  • 23.0 ap380180
  • 23.0 ap380042
  • 23.0 ap376935
  • 23.0 ap379487
  • 23.0 ap379934
  • 23.0 ap377023
  • 23.0 ap377327
  • 23.0 ap379833
  • 23.0 ap376953
  • 23.0 ap380473
  • 23.0 ap380535
  • 23.0 ap377068
  • 23.0 ap379853
  • 23.0 ap379350
  • 23.0 ap380998
  • 23.0 ap380626
  • 23.0 ap377079
  • 23.0 ap379151
  • 23.0 ap377329
  • 23.0 ap381091
  • 23.0 ap380751
  • 23.0 ap380543
  • 23.0 ap381270
  • 23.0 ap380817
  • 23.0 ap381055
  • 23.0 ap380506
  • 23.0 ap381275
  • 23.0 ap380739
  • 23.0 ap380783
  • 23.0 ap380970
  • 23.0 ap380537
  • 23.0 ap381140
  • 23.0 ap380697
  • 23.0 ap380936
  • 23.0 ap380486
  • 23.0 ap380512
  • 23.0 ap380737
  • 23.0 ap381118
  • 23.0 ap380555
  • 23.0 ap381072
  • 23.0 ap381584
  • 23.0 ap381088
  • 23.0 ap381137
  • 23.0 ap382053
  • 23.0 ap381523
  • 23.0 ap381732
  • 23.0 ap382372
  • 23.0 ap382252
  • 23.0 ap383002
  • 23.0 ap382857
  • 23.0 ap383512
  • 23.0 ap382846
  • 23.0 ap382253
  • 23.0 ap381322
  • 23.0 ap382057
  • 23.0 ap382386
  • 23.0 ap382709
  • 23.0 ap382954
  • 23.0 ap382505
  • 23.0 ap382225
  • 23.0 ap382717
  • 23.0 ap381840
  • 23.0 ap381594
  • 23.0 ap381410
  • 23.0 ap382463
  • 23.0 ap382198
  • 23.0 ap381526
  • 23.0 ap381498
  • 23.0 ap381418
  • 23.0 ap383573
  • 23.0 ap382838
  • 23.0 ap381609
  • 23.0 ap381548
  • 23.0 ap382409
  • 23.0 ap383706
  • 23.0 ap382945
  • 23.0 ap382300
  • 23.0 ap382615
  • 23.0 ap382977
  • 23.0 ap384345
  • 23.0 ap383547
  • 23.0 ap382158
  • 23.0 ap382240
  • 23.0 ap383515
  • 23.0 ap383754
  • 23.0 ap381961
  • 23.0 ap382526
  • 23.0 ap382951
  • 23.0 ap382824
  • 23.0 ap382993
  • 23.0 ap383536
  • 23.0 ap383247
  • 23.0 ap381504
  • 23.0 ap383170
  • 23.0 ap382032
  • 23.0 ap382992
  • 23.0 ap383594
  • 23.0 ap383365
  • 23.0 ap383772
  • 23.0 ap381569
  • 23.0 ap381348
  • 23.0 ap382192
  • 23.0 ap381367
  • 23.0 ap383352
  • 23.0 ap383597
  • 23.0 ap381622
  • 23.0 ap383518
  • 23.0 ap383492
  • 23.0 ap383309
  • 23.0 ap383064
  • 23.0 ap383168
  • 23.0 ap382362
  • 23.0 ap382251
  • 23.0 ap383319
  • 23.0 ap382434
  • 23.0 ap384431
  • 23.0 ap383514
  • 23.0 ap384441
  • 23.0 ap383994
  • 23.0 ap384034
  • 23.0 ap384120
  • 23.0 ap384134
  • 23.0 ap384191
  • 23.0 ap384234
  • 23.0 ap384309
  • 23.0 ap384317
  • 23.0 ap342846
  • 23.0 ap352264
  • 23.0 ap352954
  • 23.0 ap355907
  • 23.0 ap356141
  • 23.0 ap356752
  • 23.0 ap358046
  • 23.0 ap359922
  • 23.0 ap361443
  • 23.0 ap361930
  • 23.0 ap362693
  • 23.0 ap363247
  • 23.0 ap363431
  • 23.0 ap363672
  • 23.0 ap363710
  • 23.0 ap364519
  • 23.0 ap364532
  • 23.0 ap364634
  • 23.0 ap364753
  • 23.0 ap364956
  • 23.0 ap365040
  • 23.0 ap365155
  • 23.0 ap365646
  • 23.0 ap365661
  • 23.0 ap365689
  • 23.0 ap365744
  • 23.0 ap365770
  • 23.0 ap365773
  • 23.0 ap365798
  • 23.0 ap365886
  • 23.0 ap365900
  • 23.0 ap365946
  • 23.0 ap365979
  • 23.0 ap365983
  • 23.0 ap365984
  • 23.0 ap366120
  • 23.0 ap366247
  • 23.0 ap366395
  • 23.0 ap366398
  • 23.0 ap366411
  • 23.0 ap366443
  • 23.0 ap366661
  • 23.0 ap366684
  • 23.0 ap366835
  • 23.0 ap366836
  • 23.0 ap366842
  • 23.0 ap366879
  • 23.0 ap366905
  • 23.0 ap366940
  • 23.0 ap366967
  • 23.0 ap366968
  • 23.0 ap366982
  • 23.0 ap366984
  • 23.0 ap366986
  • 23.0 ap367006
  • 23.0 ap367014
  • 23.0 ap367112
  • 23.0 ap367113
  • 23.0 ap367129
  • 23.0 ap367196
  • 23.0 ap367222
  • 23.0 ap367227
  • 23.0 ap367233
  • 23.0 ap367263
  • 23.0 ap367307
  • 23.0 ap367325
  • 23.0 ap367356
  • 23.0 ap367366
  • 23.0 ap367413
  • 23.0 ap367419
  • 23.0 ap367436
  • 23.0 ap367487
  • 23.0 ap367647
  • 23.0 ap367781
  • 23.0 ap367810
  • 23.0 ap367827
  • 23.0 ap367893
  • 23.0 ap367991
  • 23.0 ap368352
  • 23.0 ap368437
  • 23.0 ap368458
  • 23.0 ap368485
  • 23.0 ap368590
  • 23.0 ap368605
  • 23.0 ap368634
  • 23.0 ap368651
  • 23.0 ap368682
  • 23.0 ap368725
  • 23.0 ap368827
  • 23.0 ap368830
  • 23.0 ap368854
  • 23.0 ap368933
  • 23.0 ap369012
  • 23.0 ap369047
  • 23.0 ap369048
  • 23.0 ap369052
  • 23.0 ap369078
  • 23.0 ap369103
  • 23.0 ap369127
  • 23.0 ap369136
  • 23.0 ap369179
  • 23.0 ap369211
  • 23.0 ap369276
  • 23.0 ap369300
  • 23.0 ap369316
  • 23.0 ap369469
  • 23.0 ap369521
  • 23.0 ap369535
  • 23.0 ap369580
  • 23.0 ap369595
  • 23.0 ap369619
  • 23.0 ap369623
  • 23.0 ap369624
  • 23.0 ap369675
  • 23.0 ap369680
  • 23.0 ap369702
  • 23.0 ap369710
  • 23.0 ap369724
  • 23.0 ap369757
  • 23.0 ap369770
  • 23.0 ap369775
  • 23.0 ap369779
  • 23.0 ap369783
  • 23.0 ap369784
  • 23.0 ap369877
  • 23.0 ap369878
  • 23.0 ap369883
  • 23.0 ap369884
  • 23.0 ap369885
  • 23.0 ap369899
  • 23.0 ap369902
  • 23.0 ap369903
  • 23.0 ap369991
  • 23.0 ap369997
  • 23.0 ap370017
  • 23.0 ap370036
  • 23.0 ap370040
  • 23.0 ap370085
  • 23.0 ap370093
  • 23.0 ap370147
  • 23.0 ap370194
  • 23.0 ap370199
  • 23.0 ap370218
  • 23.0 ap370222
  • 23.0 ap370244
  • 23.0 ap370249
  • 23.0 ap370300
  • 23.0 ap370307
  • 23.0 ap370326
  • 23.0 ap370328
  • 23.0 ap370347
  • 23.0 ap370479
  • 23.0 ap370537
  • 23.0 ap370539
  • 23.0 ap370578
  • 23.0 ap370620
  • 23.0 ap370662
  • 23.0 ap370720
  • 23.0 ap370735
  • 23.0 ap370801
  • 23.0 ap370907
  • 23.0 ap370918
  • 23.0 ap370935
  • 23.0 ap371056
  • 23.0 ap371080
  • 23.0 ap371125
  • 23.0 ap371151
  • 23.0 ap371254
  • 23.0 ap371301
  • 23.0 ap371423
  • 23.0 ap371490
  • 23.0 ap371506
  • 23.0 ap371529
  • 23.0 ap371539
  • 23.0 ap371547
  • 23.0 ap371557
  • 23.0 ap371565
  • 23.0 ap371582
  • 23.0 ap371634
  • 23.0 ap371680
  • 23.0 ap371687
  • 23.0 ap371721
  • 23.0 ap371733
  • 23.0 ap371768
  • 23.0 ap371772
  • 23.0 ap371829
  • 23.0 ap371886
  • 23.0 ap371917
  • 23.0 ap371922
  • 23.0 ap371945
  • 23.0 ap371996
  • 23.0 ap372011
  • 23.0 ap372077
  • 23.0 ap372286
  • 23.0 ap372293
  • 23.0 ap372343
  • 23.0 ap372432
  • 23.0 ap372436
  • 23.0 ap372475
  • 23.0 ap372502
  • 23.0 ap372505
  • 23.0 ap372508
  • 23.0 ap372510
  • 23.0 ap372516
  • 23.0 ap372561
  • 23.0 ap372610
  • 23.0 ap372617
  • 23.0 ap372633
  • 23.0 ap372655
  • 23.0 ap372692
  • 23.0 ap372796
  • 23.0 ap372890
  • 23.0 ap372910
  • 23.0 ap372942
  • 23.0 ap372943
  • 23.0 ap372989
  • 23.0 ap373001
  • 23.0 ap373047
  • 23.0 ap373097
  • 23.0 ap373146
  • 23.0 ap373172
  • 23.0 ap373180
  • 23.0 ap373197
  • 23.0 ap373239
  • 23.0 ap373261
  • 23.0 ap373284
  • 23.0 ap373300
  • 23.0 ap373332
  • 23.0 ap373336
  • 23.0 ap373339
  • 23.0 ap373340
  • 23.0 ap373392
  • 23.0 ap373412
  • 23.0 ap373521
  • 23.0 ap373534
  • 23.0 ap373565
  • 23.0 ap373584
  • 23.0 ap373649
  • 23.0 ap373711
  • 23.0 ap373717
  • 23.0 ap373783
  • 23.0 ap373821
  • 23.0 ap373872
  • 23.0 ap373881
  • 23.0 ap373914
  • 23.0 ap373924
  • 23.0 ap374144
  • 23.0 ap374145
  • 23.0 ap374211
  • 23.0 ap374270
  • 23.0 ap374286
  • 23.0 ap374414
  • 23.0 ap374530
  • 23.0 ap374548
  • 23.0 ap374600
  • 23.0 ap374605
  • 23.0 ap374641
  • 23.0 ap374643
  • 23.0 ap374695
  • 23.0 ap374786
  • 23.0 ap374829
  • 23.0 ap374832
  • 23.0 ap374869
  • 23.0 ap374917
  • 23.0 ap374935
  • 23.0 ap374943
  • 23.0 ap374956
  • 23.0 ap375004
  • 23.0 ap375021
  • 23.0 ap375036
  • 23.0 ap375039
  • 23.0 ap375041
  • 23.0 ap375125
  • 23.0 ap375153
  • 23.0 ap375205
  • 23.0 ap375207
  • 23.0 ap375210
  • 23.0 ap375214
  • 23.0 ap375240
  • 23.0 ap375260
  • 23.0 ap375270
  • 23.0 ap375273
  • 23.0 ap375335
  • 23.0 ap375342
  • 23.0 ap375351
  • 23.0 ap375398
  • 23.0 ap375409
  • 23.0 ap375412
  • 23.0 ap375414
  • 23.0 ap375421
  • 23.0 ap375425
  • 23.0 ap375430
  • 23.0 ap375432
  • 23.0 ap375453
  • 23.0 ap375466
  • 23.0 ap375469
  • 23.0 ap375476
  • 23.0 ap375484
  • 23.0 ap375488
  • 23.0 ap375489
  • 23.0 ap375502
  • 23.0 ap375514
  • 23.0 ap375518
  • 23.0 ap375603
  • 23.0 ap375700
  • 23.0 ap375711
  • 23.0 ap375730
  • 23.0 ap375748
  • 23.0 ap375756
  • 23.0 ap375757
  • 23.0 ap375804
  • 23.0 ap375828
  • 23.0 ap375849
  • 23.0 ap375860
  • 23.0 ap375944
  • 23.0 ap375949
  • 23.0 ap375950
  • 23.0 ap375959
  • 23.0 ap375962
  • 23.0 ap375982
  • 23.0 ap375989
  • 23.0 ap375990
  • 23.0 ap375996
  • 23.0 ap376000
  • 23.0 ap376001
  • 23.0 ap376012
  • 23.0 ap376024
  • 23.0 ap376042
  • 23.0 ap376099
  • 23.0 ap376140
  • 23.0 ap376156
  • 23.0 ap376189
  • 23.0 ap376213
  • 23.0 ap376220
  • 23.0 ap376267
  • 23.0 ap376308
  • 23.0 ap376317
  • 23.0 ap376340
  • 23.0 ap376341
  • 23.0 ap376384
  • 23.0 ap376414
  • 23.0 ap376445
  • 23.0 ap376450
  • 23.0 ap376486
  • 23.0 ap376507
  • 23.0 ap376512
  • 23.0 ap376529
  • 23.0 ap376613
  • 23.0 ap376622
  • 23.0 ap376664
  • 23.0 ap376666
  • 23.0 ap376695
  • 23.0 ap376696
  • 23.0 ap376699
  • 23.0 ap376702
  • 23.0 ap376704
  • 23.0 ap376721
  • 23.0 ap376722
  • 23.0 ap376736
  • 23.0 ap376787
  • 23.0 ap376798
  • 23.0 ap376802
  • 23.0 ap376809
  • 23.0 ap376818
  • 23.0 ap376820
  • 23.0 ap376842
  • 23.0 ap376878
  • 23.0 ap376889
  • 23.0 ap376934
  • 23.0 ap376945
  • 23.0 ap376956
  • 23.0 ap376979
  • 23.0 ap377012
  • 23.0 ap377033
  • 23.0 ap377050
  • 23.0 ap377091
  • 23.0 ap377109
  • 23.0 ap377120
  • 23.0 ap377163
  • 23.0 ap377175
  • 23.0 ap377177
  • 23.0 ap377229
  • 23.0 ap377378
  • 23.0 ap377399
  • 23.0 ap377485
  • 23.0 ap377517
  • 23.0 ap377538
  • 23.0 ap377555
  • 23.0 ap377569
  • 23.0 ap377628
  • 23.0 ap377630
  • 23.0 ap377651
  • 23.0 ap377667
  • 23.0 ap377670
  • 23.0 ap377687
  • 23.0 ap377718
  • 23.0 ap377723
  • 23.0 ap377737
  • 23.0 ap377743
  • 23.0 ap377751
  • 23.0 ap377868
  • 23.0 ap377878
  • 23.0 ap377888
  • 23.0 ap377913
  • 23.0 ap377966
  • 23.0 ap377983
  • 23.0 ap378010
  • 23.0 ap378014
  • 23.0 ap378019
  • 23.0 ap378029
  • 23.0 ap378051
  • 23.0 ap378070
  • 23.0 ap378087
  • 23.0 ap378122
  • 23.0 ap378141
  • 23.0 ap378142
  • 23.0 ap378144
  • 23.0 ap378150
  • 23.0 ap378154
  • 23.0 ap378168
  • 23.0 ap378178
  • 23.0 ap378227
  • 23.0 ap378234
  • 23.0 ap378242
  • 23.0 ap378248
  • 23.0 ap378258
  • 23.0 ap378372
  • 23.0 ap378383
  • 23.0 ap378390
  • 23.0 ap378415
  • 23.0 ap378437
  • 23.0 ap378481
  • 23.0 ap378506
  • 23.0 ap378535
  • 23.0 ap378553
  • 23.0 ap378575
  • 23.0 ap378595
  • 23.0 ap378818
  • 23.0 ap378827
  • 23.0 ap378886
  • 23.0 ap378902
  • 23.0 ap378913
  • 23.0 ap378920
  • 23.0 ap378952
  • 23.0 ap378976
  • 23.0 ap378987
  • 23.0 ap378995
  • 23.0 ap379069
  • 23.0 ap379091
  • 23.0 ap379105
  • 23.0 ap379112
  • 23.0 ap379122
  • 23.0 ap379152
  • 23.0 ap379168
  • 23.0 ap379187
  • 23.0 ap379190
  • 23.0 ap379199
  • 23.0 ap379329
  • 23.0 ap379331
  • 23.0 ap379346
  • 23.0 ap379373
  • 23.0 ap379378
  • 23.0 ap379389
  • 23.0 ap379390
  • 23.0 ap379391
  • 23.0 ap379395
  • 23.0 ap379411
  • 23.0 ap379423
  • 23.0 ap379474
  • 23.0 ap379475
  • 23.0 ap379482
  • 23.0 ap379511
  • 23.0 ap379515
  • 23.0 ap379532
  • 23.0 ap379533
  • 23.0 ap379535
  • 23.0 ap379565
  • 23.0 ap379600
  • 23.0 ap379616
  • 23.0 ap379627
  • 23.0 ap379635
  • 23.0 ap379781
  • 23.0 ap379782
  • 23.0 ap379830
  • 23.0 ap379839
  • 23.0 ap379855
  • 23.0 ap379889
  • 23.0 ap379903
  • 23.0 ap379921
  • 23.0 ap379925
  • 23.0 ap379957
  • 23.0 ap379963
  • 23.0 ap380109
  • 23.0 ap380181
  • 23.0 ap380196
  • 23.0 ap380256
  • 23.0 ap380264
  • 23.0 ap380282
  • 23.0 ap380465
  • 23.0 ap380501
  • 23.0 ap380581
  • 23.0 ap380613
  • 23.0 ap380620
  • 23.0 ap380635
  • 23.0 ap380637
  • 23.0 ap380762
  • 23.0 ap380775
  • 23.0 ap380782
  • 23.0 ap380802
  • 23.0 ap380840
  • 23.0 ap380939
  • 23.0 ap381001
  • 23.0 ap381004
  • 23.0 ap381047
  • 23.0 ap381078
  • 23.0 ap381108
  • 23.0 ap381128
  • 23.0 ap381215
  • 23.0 ap381257
  • 23.0 ap381285
  • 23.0 ap381292
  • 23.0 ap381300
  • 23.0 ap381305
  • 23.0 ap381308
  • 23.0 ap381334
  • 23.0 ap381339
  • 23.0 ap381384
  • 23.0 ap381385
  • 23.0 ap381398
  • 23.0 ap381412
  • 23.0 ap381507
  • 23.0 ap381518
  • 23.0 ap381527
  • 23.0 ap381543
  • 23.0 ap381570
  • 23.0 ap381575
  • 23.0 ap381600
  • 23.0 ap381611
  • 23.0 ap381615
  • 23.0 ap381616
  • 23.0 ap381621
  • 23.0 ap381623
  • 23.0 ap381624
  • 23.0 ap381654
  • 23.0 ap381666
  • 23.0 ap381734
  • 23.0 ap381775
  • 23.0 ap381809
  • 23.0 ap381825
  • 23.0 ap381826
  • 23.0 ap381854
  • 23.0 ap381874
  • 23.0 ap381878
  • 23.0 ap381936
  • 23.0 ap381952
  • 23.0 ap381956
  • 23.0 ap381970
  • 23.0 ap381971
  • 23.0 ap381975
  • 23.0 ap382039
  • 23.0 ap382042
  • 23.0 ap382045
  • 23.0 ap382098
  • 23.0 ap382155
  • 23.0 ap382160
  • 23.0 ap382164
  • 23.0 ap382167
  • 23.0 ap382170
  • 23.0 ap382189
  • 23.0 ap382194
  • 23.0 ap382231
  • 23.0 ap382267
  • 23.0 ap382277
  • 23.0 ap382412
  • 23.0 ap382441
  • 23.0 ap382445
  • 23.0 ap382474
  • 23.0 ap382484
  • 23.0 ap382488
  • 23.0 ap382527
  • 23.0 ap382594
  • 23.0 ap382631
  • 23.0 ap382656
  • 23.0 ap382673
  • 23.0 ap382676
  • 23.0 ap382677
  • 23.0 ap382691
  • 23.0 ap382692
  • 23.0 ap382703
  • 23.0 ap382740
  • 23.0 ap382750
  • 23.0 ap382836
  • 23.0 ap382841
  • 23.0 ap382873
  • 23.0 ap382894
  • 23.0 ap382912
  • 23.0 ap382929
  • 23.0 ap382935
  • 23.0 ap382965
  • 23.0 ap382969
  • 23.0 ap382976
  • 23.0 ap382994
  • 23.0 ap383105
  • 23.0 ap383123
  • 23.0 ap383147
  • 23.0 ap383178
  • 23.0 ap383188
  • 23.0 ap383297
  • 23.0 ap383326
  • 23.0 ap383327
  • 23.0 ap383331
  • 23.0 ap383346
  • 23.0 ap383377
  • 23.0 ap383455
  • 23.0 ap383459
  • 23.0 ap383463
  • 23.0 ap383494
  • 23.0 ap383498
  • 23.0 ap383511
  • 23.0 ap383520
  • 23.0 ap383700
  • 23.0 ap383821
  • 23.0 ap384239
  • 23.0 ap384339
  • 23.0 ap384351
  • 23.0 ap384361
  • 23.0 ap384367
  • 23.0 ap384389
  • 23.0 ap384395
  • 23.0 ap384428
  • 23.0 ap384429
  • 23.0 ap384434
  • 23.0 ap384448
  • 23.0 ap384471
  • 23.0 ap384474
  • 23.0 ap384543
  • 23.0 ap384622
  • 23.0 ap384629
  • 23.0 ap384639
  • 23.0 ap384643
  • 23.0 ap384650
  • 22.0 ap347303
  • 22.0 ap352927
  • 22.0 ap353464
  • 22.0 ap363049
  • 22.0 ap358026
  • 22.0 ap375466
  • 22.0 ap383603
  • 22.0 ap362680
  • 22.0 ap356797
  • 22.0 ap353663
  • 22.0 ap357146
  • 22.0 ap357613
  • 22.0 ap371890
  • 22.0 ap356422
  • 22.0 ap376340
  • 22.0 ap362872
  • 22.0 ap381970
  • 22.0 ap377651
  • 22.0 ap383459
  • 22.0 ap376000
  • 22.0 ap357856
  • 22.0 ap380196
  • 22.0 ap372607
  • 22.0 ap362313
  • 22.0 ap371974
  • 22.0 ap372995
  • 22.0 ap377628
  • 22.0 ap365983
  • 22.0 ap371721
  • 22.0 ap352180
  • 22.0 ap358511
  • 22.0 ap364753
  • 22.0 ap373004
  • 22.0 ap376634
  • 22.0 ap382236
  • 22.0 ap353419
  • 22.0 ap372922
  • 22.0 ap382206
  • 22.0 ap383594
  • 22.0 ap366609
  • 22.0 ap380756
  • 22.0 ap349400
  • 22.0 ap366395
  • 22.0 ap366443
  • 22.0 ap372455
  • 22.0 ap347895
  • 22.0 ap372533
  • 22.0 ap366842
  • 22.0 ap353025
  • 22.0 ap351936
  • 22.0 ap353315
  • 22.0 ap352341
  • 22.0 ap339584
  • 22.0 ap352961
  • 22.0 ap359922
  • 22.0 ap353558
  • 22.0 ap371725
  • 22.0 ap371432
  • 22.0 ap357819
  • 22.0 ap358289
  • 22.0 ap354719
  • 22.0 ap367227
  • 22.0 ap364519
  • 22.0 ap367014
  • 22.0 ap360797
  • 22.0 ap366120
  • 22.0 ap372207
  • 22.0 ap365829
  • 22.0 ap365979
  • 22.0 ap366993
  • 22.0 ap365124
  • 22.0 ap366763
  • 22.0 ap352238
  • 22.0 ap383319
  • 22.0 ap372071
  • 22.0 ap354673
  • 22.0 ap371868
  • 22.0 ap353954
  • 22.0 ap366800
  • 22.0 ap357760
  • 22.0 ap366857
  • 22.0 ap365886
  • 22.0 ap372116
  • 22.0 ap354726
  • 22.0 ap364956
  • 22.0 ap382703
  • 22.0 ap367293
  • 22.0 ap366307
  • 22.0 ap352359
  • 22.0 ap376001
  • 22.0 ap366411
  • 22.0 ap365773
  • 22.0 ap362262
  • 22.0 ap351205
  • 22.0 ap383512
  • 22.0 ap355020
  • 22.0 ap352985
  • 22.0 ap354580
  • 22.0 ap373821
  • 22.0 ap376308
  • 22.0 ap353140
  • 22.0 ap374668
  • 22.0 ap372079
  • 22.0 ap366684
  • 22.0 ap366398
  • 22.0 ap358328
  • 22.0 ap373016
  • 22.0 ap358597
  • 22.0 ap383346
  • 22.0 ap374786
  • 22.0 ap348687
  • 22.0 ap352498
  • 22.0 ap366247
  • 22.0 ap351868
  • 22.0 ap383494
  • 22.0 ap367419
  • 22.0 ap369731
  • 22.0 ap383511
  • 22.0 ap382493
  • 22.0 ap365030
  • 22.0 ap372121
  • 22.0 ap371748
  • 22.0 ap372345
  • 22.0 ap365386
  • 22.0 ap365017
  • 22.0 ap355740
  • 22.0 ap365014
  • 22.0 ap365351
  • 22.0 ap364843
  • 22.0 ap374715
  • 22.0 ap364718
  • 22.0 ap363394
  • 22.0 ap364467
  • 22.0 ap365348
  • 22.0 ap359767
  • 22.0 ap364754
  • 22.0 ap365066
  • 22.0 ap370147
  • 22.0 ap365682
  • 22.0 ap365246
  • 22.0 ap364863
  • 22.0 ap365155
  • 22.0 ap381952
  • 22.0 ap370792
  • 22.0 ap363768
  • 22.0 ap366606
  • 22.0 ap363644
  • 22.0 ap376140
  • 22.0 ap367446
  • 22.0 ap362261
  • 22.0 ap374188
  • 22.0 ap376088
  • 22.0 ap374069
  • 22.0 ap374182
  • 22.0 ap377012
  • 22.0 ap382484
  • 22.0 ap373752
  • 22.0 ap373912
  • 22.0 ap374143
  • 22.0 ap381654
  • 22.0 ap350604
  • 22.0 ap369749
  • 22.0 ap377378
  • 22.0 ap360755
  • 22.0 ap369991
  • 22.0 ap379839
  • 22.0 ap358894
  • 22.0 ap360867
  • 22.0 ap359973
  • 22.0 ap354412
  • 22.0 ap373871
  • 22.0 ap377176
  • 22.0 ap358699
  • 22.0 ap374125
  • 22.0 ap358890
  • 22.0 ap352126
  • 22.0 ap351795
  • 22.0 ap349845
  • 22.0 ap357595
  • 22.0 ap352143
  • 22.0 ap357736
  • 22.0 ap352651
  • 22.0 ap351682
  • 22.0 ap348143
  • 22.0 ap351798
  • 22.0 ap352345
  • 22.0 ap354685
  • 22.0 ap352357
  • 22.0 ap358338
  • 22.0 ap351179
  • 22.0 ap361155
  • 22.0 ap356842
  • 22.0 ap357918
  • 22.0 ap355907
  • 22.0 ap358133
  • 22.0 ap354314
  • 22.0 ap371811
  • 22.0 ap361516
  • 22.0 ap357176
  • 22.0 ap352386
  • 22.0 ap358188
  • 22.0 ap357562
  • 22.0 ap360464
  • 22.0 ap357623
  • 22.0 ap366967
  • 22.0 ap383520
  • 22.0 ap369899
  • 22.0 ap361651
  • 22.0 ap371565
  • 22.0 ap355753
  • 22.0 ap371547
  • 22.0 ap350538
  • 22.0 ap359791
  • 22.0 ap372516
  • 22.0 ap372692
  • 22.0 ap357802
  • 22.0 ap358089
  • 22.0 ap371506
  • 22.0 ap366335
  • 22.0 ap362035
  • 22.0 ap362749
  • 22.0 ap353845
  • 22.0 ap352293
  • 22.0 ap381348
  • 22.0 ap354736
  • 22.0 ap350140
  • 22.0 ap381357
  • 22.0 ap371634
  • 22.0 ap371687
  • 22.0 ap355298
  • 22.0 ap372610
  • 22.0 ap366525
  • 22.0 ap374711
  • 22.0 ap366201
  • 22.0 ap373778
  • 22.0 ap354129
  • 22.0 ap369702
  • 22.0 ap381384
  • 22.0 ap352796
  • 22.0 ap350990
  • 22.0 ap358314
  • 22.0 ap368827
  • 22.0 ap372239
  • 22.0 ap372796
  • 22.0 ap349254
  • 22.0 ap368682
  • 22.0 ap366275
  • 22.0 ap354690
  • 22.0 ap365744
  • 22.0 ap354779
  • 22.0 ap368458
  • 22.0 ap366296
  • 22.0 ap364518
  • 22.0 ap352887
  • 22.0 ap374600
  • 22.0 ap351015
  • 22.0 ap371698
  • 22.0 ap366610
  • 22.0 ap367647
  • 22.0 ap371747
  • 22.0 ap368352
  • 22.0 ap375502
  • 22.0 ap371829
  • 22.0 ap372343
  • 22.0 ap364560
  • 22.0 ap364622
  • 22.0 ap359172
  • 22.0 ap383821
  • 22.0 ap353515
  • 22.0 ap362960
  • 22.0 ap369048
  • 22.0 ap365626
  • 22.0 ap364711
  • 22.0 ap362364
  • 22.0 ap362149
  • 22.0 ap362747
  • 22.0 ap382164
  • 22.0 ap358013
  • 22.0 ap382170
  • 22.0 ap368830
  • 22.0 ap364960
  • 22.0 ap361024
  • 22.0 ap362708
  • 22.0 ap381874
  • 22.0 ap371314
  • 22.0 ap364009
  • 22.0 ap361577
  • 22.0 ap382155
  • 22.0 ap361008
  • 22.0 ap371319
  • 22.0 ap364862
  • 22.0 ap371530
  • 22.0 ap364897
  • 22.0 ap352835
  • 22.0 ap365946
  • 22.0 ap362964
  • 22.0 ap360906
  • 22.0 ap376702
  • 22.0 ap371268
  • 22.0 ap370017
  • 22.0 ap361354
  • 22.0 ap361100
  • 22.0 ap361507
  • 22.0 ap378010
  • 22.0 ap355126
  • 22.0 ap360503
  • 22.0 ap362963
  • 22.0 ap357187
  • 22.0 ap382864
  • 22.0 ap353015
  • 22.0 ap371456
  • 22.0 ap371582
  • 22.0 ap372012
  • 22.0 ap383716
  • 22.0 ap383909
  • 22.0 ap383701
  • 22.0 ap342175
  • 22.0 ap339371
  • 22.0 ap353835
  • 22.0 ap351023
  • 22.0 ap354154
  • 22.0 ap353865
  • 22.0 ap350800
  • 22.0 ap350032
  • 22.0 ap349201
  • 22.0 ap353120
  • 22.0 ap351924
  • 22.0 ap351817
  • 22.0 ap353549
  • 22.0 ap353179
  • 22.0 ap351960
  • 22.0 ap352304
  • 22.0 ap353390
  • 22.0 ap352707
  • 22.0 ap355636
  • 22.0 ap352837
  • 22.0 ap353311
  • 22.0 ap352337
  • 22.0 ap355300
  • 22.0 ap356412
  • 22.0 ap355946
  • 22.0 ap355647
  • 22.0 ap356253
  • 22.0 ap354528
  • 22.0 ap355353
  • 22.0 ap356359
  • 22.0 ap355952
  • 22.0 ap354909
  • 22.0 ap355616
  • 22.0 ap356749
  • 22.0 ap357347
  • 22.0 ap354597
  • 22.0 ap356319
  • 22.0 ap356774
  • 22.0 ap356551
  • 22.0 ap351262
  • 22.0 ap357040
  • 22.0 ap357525
  • 22.0 ap357447
  • 22.0 ap357560
  • 22.0 ap357608
  • 22.0 ap357655
  • 22.0 ap357597
  • 22.0 ap358099
  • 22.0 ap357523
  • 22.0 ap357621
  • 22.0 ap357795
  • 22.0 ap358291
  • 22.0 ap359434
  • 22.0 ap358290
  • 22.0 ap358119
  • 22.0 ap359549
  • 22.0 ap358603
  • 22.0 ap359674
  • 22.0 ap359121
  • 22.0 ap360250
  • 22.0 ap360564
  • 22.0 ap359106
  • 22.0 ap359218
  • 22.0 ap359769
  • 22.0 ap360164
  • 22.0 ap359001
  • 22.0 ap360365
  • 22.0 ap360816
  • 22.0 ap361116
  • 22.0 ap361353
  • 22.0 ap361076
  • 22.0 ap360531
  • 22.0 ap362367
  • 22.0 ap362683
  • 22.0 ap362276
  • 22.0 ap362707
  • 22.0 ap361934
  • 22.0 ap363082
  • 22.0 ap361154
  • 22.0 ap362122
  • 22.0 ap364194
  • 22.0 ap361666
  • 22.0 ap362492
  • 22.0 ap363753
  • 22.0 ap362644
  • 22.0 ap367820
  • 22.0 ap362575
  • 22.0 ap363361
  • 22.0 ap363760
  • 22.0 ap364048
  • 22.0 ap363233
  • 22.0 ap363666
  • 22.0 ap363568
  • 22.0 ap367974
  • 22.0 ap364278
  • 22.0 ap363824
  • 22.0 ap368067
  • 22.0 ap363976
  • 22.0 ap364213
  • 22.0 ap364275
  • 22.0 ap366397
  • 22.0 ap366624
  • 22.0 ap363582
  • 22.0 ap364125
  • 22.0 ap366252
  • 22.0 ap363408
  • 22.0 ap366715
  • 22.0 ap364214
  • 22.0 ap364258
  • 22.0 ap366784
  • 22.0 ap366358
  • 22.0 ap366180
  • 22.0 ap365172
  • 22.0 ap366430
  • 22.0 ap364778
  • 22.0 ap364834
  • 22.0 ap364521
  • 22.0 ap364905
  • 22.0 ap364844
  • 22.0 ap364635
  • 22.0 ap367298
  • 22.0 ap365171
  • 22.0 ap364924
  • 22.0 ap365905
  • 22.0 ap365515
  • 22.0 ap367001
  • 22.0 ap365577
  • 22.0 ap365759
  • 22.0 ap365758
  • 22.0 ap367290
  • 22.0 ap367183
  • 22.0 ap371654
  • 22.0 ap371703
  • 22.0 ap365511
  • 22.0 ap365576
  • 22.0 ap370802
  • 22.0 ap365944
  • 22.0 ap366959
  • 22.0 ap371202
  • 22.0 ap365858
  • 22.0 ap371919
  • 22.0 ap367294
  • 22.0 ap371343
  • 22.0 ap367206
  • 22.0 ap371134
  • 22.0 ap372178
  • 22.0 ap371926
  • 22.0 ap372017
  • 22.0 ap371681
  • 22.0 ap372192
  • 22.0 ap371610
  • 22.0 ap371546
  • 22.0 ap371281
  • 22.0 ap371770
  • 22.0 ap370908
  • 22.0 ap368308
  • 22.0 ap371195
  • 22.0 ap371366
  • 22.0 ap368140
  • 22.0 ap371977
  • 22.0 ap371682
  • 22.0 ap371627
  • 22.0 ap369641
  • 22.0 ap369855
  • 22.0 ap368195
  • 22.0 ap368957
  • 22.0 ap368612
  • 22.0 ap368568
  • 22.0 ap368217
  • 22.0 ap369529
  • 22.0 ap368096
  • 22.0 ap368601
  • 22.0 ap368970
  • 22.0 ap369881
  • 22.0 ap369550
  • 22.0 ap369295
  • 22.0 ap369473
  • 22.0 ap369065
  • 22.0 ap372433
  • 22.0 ap372567
  • 22.0 ap372522
  • 22.0 ap369800
  • 22.0 ap372389
  • 22.0 ap372560
  • 22.0 ap370563
  • 22.0 ap370344
  • 22.0 ap372623
  • 22.0 ap370424
  • 22.0 ap370170
  • 22.0 ap374680
  • 22.0 ap374169
  • 22.0 ap374799
  • 22.0 ap370437
  • 22.0 ap374430
  • 22.0 ap374677
  • 22.0 ap372968
  • 22.0 ap373118
  • 22.0 ap373855
  • 22.0 ap373438
  • 22.0 ap374660
  • 22.0 ap373391
  • 22.0 ap373196
  • 22.0 ap373732
  • 22.0 ap374113
  • 22.0 ap373034
  • 22.0 ap373189
  • 22.0 ap374488
  • 22.0 ap374354
  • 22.0 ap373285
  • 22.0 ap373108
  • 22.0 ap374238
  • 22.0 ap373315
  • 22.0 ap373299
  • 22.0 ap373137
  • 22.0 ap373482
  • 22.0 ap375734
  • 22.0 ap375625
  • 22.0 ap375862
  • 22.0 ap373318
  • 22.0 ap375441
  • 22.0 ap375200
  • 22.0 ap374131
  • 22.0 ap373008
  • 22.0 ap376504
  • 22.0 ap376355
  • 22.0 ap372799
  • 22.0 ap376577
  • 22.0 ap374977
  • 22.0 ap375206
  • 22.0 ap375309
  • 22.0 ap375937
  • 22.0 ap375465
  • 22.0 ap375464
  • 22.0 ap375865
  • 22.0 ap375672
  • 22.0 ap375793
  • 22.0 ap374891
  • 22.0 ap376100
  • 22.0 ap375382
  • 22.0 ap375383
  • 22.0 ap375661
  • 22.0 ap375709
  • 22.0 ap375984
  • 22.0 ap375719
  • 22.0 ap376117
  • 22.0 ap376535
  • 22.0 ap375654
  • 22.0 ap375133
  • 22.0 ap375413
  • 22.0 ap379838
  • 22.0 ap375797
  • 22.0 ap379775
  • 22.0 ap380446
  • 22.0 ap379752
  • 22.0 ap376261
  • 22.0 ap380232
  • 22.0 ap375720
  • 22.0 ap380506
  • 22.0 ap380108
  • 22.0 ap376633
  • 22.0 ap379917
  • 22.0 ap380201
  • 22.0 ap379951
  • 22.0 ap380507
  • 22.0 ap380449
  • 22.0 ap380137
  • 22.0 ap376988
  • 22.0 ap376989
  • 22.0 ap376752
  • 22.0 ap376642
  • 22.0 ap377225
  • 22.0 ap376953
  • 22.0 ap376935
  • 22.0 ap377497
  • 22.0 ap376652
  • 22.0 ap380130
  • 22.0 ap376762
  • 22.0 ap377982
  • 22.0 ap376844
  • 22.0 ap377625
  • 22.0 ap377483
  • 22.0 ap377042
  • 22.0 ap378334
  • 22.0 ap377389
  • 22.0 ap378055
  • 22.0 ap378485
  • 22.0 ap378257
  • 22.0 ap377164
  • 22.0 ap378393
  • 22.0 ap378025
  • 22.0 ap377409
  • 22.0 ap378419
  • 22.0 ap377327
  • 22.0 ap378161
  • 22.0 ap377045
  • 22.0 ap378866
  • 22.0 ap379461
  • 22.0 ap379326
  • 22.0 ap378079
  • 22.0 ap377715
  • 22.0 ap379151
  • 22.0 ap379350
  • 22.0 ap379427
  • 22.0 ap379493
  • 22.0 ap379556
  • 22.0 ap379153
  • 22.0 ap382225
  • 22.0 ap380555
  • 22.0 ap381137
  • 22.0 ap382032
  • 22.0 ap382362
  • 22.0 ap381275
  • 22.0 ap381622
  • 22.0 ap380970
  • 22.0 ap382251
  • 22.0 ap382372
  • 22.0 ap381009
  • 22.0 ap381140
  • 22.0 ap381504
  • 22.0 ap382409
  • 22.0 ap382993
  • 22.0 ap382951
  • 22.0 ap383655
  • 22.0 ap382615
  • 22.0 ap382903
  • 22.0 ap382838
  • 22.0 ap382476
  • 22.0 ap347536
  • 22.0 ap347644
  • 22.0 ap347645
  • 22.0 ap347673
  • 22.0 ap347677
  • 22.0 ap347726
  • 22.0 ap348474
  • 22.0 ap348575
  • 22.0 ap348766
  • 22.0 ap349235
  • 22.0 ap349441
  • 22.0 ap349501
  • 22.0 ap349582
  • 22.0 ap349664
  • 22.0 ap349820
  • 22.0 ap349858
  • 22.0 ap350056
  • 22.0 ap350175
  • 22.0 ap350471
  • 22.0 ap350527
  • 22.0 ap350564
  • 22.0 ap350603
  • 22.0 ap350864
  • 22.0 ap350908
  • 22.0 ap350969
  • 22.0 ap351199
  • 22.0 ap351223
  • 22.0 ap351246
  • 22.0 ap351345
  • 22.0 ap351527
  • 22.0 ap351727
  • 22.0 ap351744
  • 22.0 ap351942
  • 22.0 ap352184
  • 22.0 ap352203
  • 22.0 ap352264
  • 22.0 ap352323
  • 22.0 ap352369
  • 22.0 ap352423
  • 22.0 ap352511
  • 22.0 ap352697
  • 22.0 ap352711
  • 22.0 ap352804
  • 22.0 ap352805
  • 22.0 ap352824
  • 22.0 ap352915
  • 22.0 ap352954
  • 22.0 ap353001
  • 22.0 ap353122
  • 22.0 ap353137
  • 22.0 ap353167
  • 22.0 ap353168
  • 22.0 ap353354
  • 22.0 ap353389
  • 22.0 ap353623
  • 22.0 ap353658
  • 22.0 ap353708
  • 22.0 ap353812
  • 22.0 ap353836
  • 22.0 ap353839
  • 22.0 ap353852
  • 22.0 ap353856
  • 22.0 ap353870
  • 22.0 ap353985
  • 22.0 ap354005
  • 22.0 ap354077
  • 22.0 ap354164
  • 22.0 ap354170
  • 22.0 ap354195
  • 22.0 ap354200
  • 22.0 ap354316
  • 22.0 ap354365
  • 22.0 ap354380
  • 22.0 ap354415
  • 22.0 ap354438
  • 22.0 ap354439
  • 22.0 ap354535
  • 22.0 ap354556
  • 22.0 ap354616
  • 22.0 ap354681
  • 22.0 ap354942
  • 22.0 ap355002
  • 22.0 ap355003
  • 22.0 ap355069
  • 22.0 ap355102
  • 22.0 ap355112
  • 22.0 ap355121
  • 22.0 ap355124
  • 22.0 ap355125
  • 22.0 ap355197
  • 22.0 ap355201
  • 22.0 ap355236
  • 22.0 ap355265
  • 22.0 ap355283
  • 22.0 ap355356
  • 22.0 ap355568
  • 22.0 ap355599
  • 22.0 ap355628
  • 22.0 ap355637
  • 22.0 ap355639
  • 22.0 ap355640
  • 22.0 ap355664
  • 22.0 ap355669
  • 22.0 ap355670
  • 22.0 ap355806
  • 22.0 ap355820
  • 22.0 ap355833
  • 22.0 ap355836
  • 22.0 ap355838
  • 22.0 ap355896
  • 22.0 ap355897
  • 22.0 ap356007
  • 22.0 ap356029
  • 22.0 ap356141
  • 22.0 ap356142
  • 22.0 ap356152
  • 22.0 ap356231
  • 22.0 ap356254
  • 22.0 ap356301
  • 22.0 ap356320
  • 22.0 ap356345
  • 22.0 ap356353
  • 22.0 ap356497
  • 22.0 ap356527
  • 22.0 ap356570
  • 22.0 ap356575
  • 22.0 ap356589
  • 22.0 ap356707
  • 22.0 ap356752
  • 22.0 ap356935
  • 22.0 ap356969
  • 22.0 ap356978
  • 22.0 ap357019
  • 22.0 ap357029
  • 22.0 ap357039
  • 22.0 ap357081
  • 22.0 ap357105
  • 22.0 ap357162
  • 22.0 ap357172
  • 22.0 ap357181
  • 22.0 ap357185
  • 22.0 ap357330
  • 22.0 ap357366
  • 22.0 ap357387
  • 22.0 ap357405
  • 22.0 ap357413
  • 22.0 ap357417
  • 22.0 ap357452
  • 22.0 ap357454
  • 22.0 ap357507
  • 22.0 ap357508
  • 22.0 ap357610
  • 22.0 ap357624
  • 22.0 ap357653
  • 22.0 ap357670
  • 22.0 ap357675
  • 22.0 ap357761
  • 22.0 ap357889
  • 22.0 ap357915
  • 22.0 ap357917
  • 22.0 ap358012
  • 22.0 ap358046
  • 22.0 ap358082
  • 22.0 ap358096
  • 22.0 ap358128
  • 22.0 ap358241
  • 22.0 ap358271
  • 22.0 ap358330
  • 22.0 ap358360
  • 22.0 ap358365
  • 22.0 ap358440
  • 22.0 ap358441
  • 22.0 ap358513
  • 22.0 ap358521
  • 22.0 ap358568
  • 22.0 ap358604
  • 22.0 ap358643
  • 22.0 ap358651
  • 22.0 ap358681
  • 22.0 ap358707
  • 22.0 ap358730
  • 22.0 ap358732
  • 22.0 ap358737
  • 22.0 ap358845
  • 22.0 ap358870
  • 22.0 ap358891
  • 22.0 ap358901
  • 22.0 ap358907
  • 22.0 ap358920
  • 22.0 ap358942
  • 22.0 ap358943
  • 22.0 ap358944
  • 22.0 ap359044
  • 22.0 ap359118
  • 22.0 ap359130
  • 22.0 ap359153
  • 22.0 ap359164
  • 22.0 ap359186
  • 22.0 ap359191
  • 22.0 ap359225
  • 22.0 ap359259
  • 22.0 ap359292
  • 22.0 ap359298
  • 22.0 ap359324
  • 22.0 ap359421
  • 22.0 ap359424
  • 22.0 ap359458
  • 22.0 ap359464
  • 22.0 ap359492
  • 22.0 ap359562
  • 22.0 ap359570
  • 22.0 ap359612
  • 22.0 ap359657
  • 22.0 ap359710
  • 22.0 ap359772
  • 22.0 ap359775
  • 22.0 ap359812
  • 22.0 ap359826
  • 22.0 ap359851
  • 22.0 ap359892
  • 22.0 ap359925
  • 22.0 ap360167
  • 22.0 ap360198
  • 22.0 ap360231
  • 22.0 ap360245
  • 22.0 ap360319
  • 22.0 ap360375
  • 22.0 ap360563
  • 22.0 ap360603
  • 22.0 ap360627
  • 22.0 ap360790
  • 22.0 ap360874
  • 22.0 ap360943
  • 22.0 ap360955
  • 22.0 ap361062
  • 22.0 ap361080
  • 22.0 ap361379
  • 22.0 ap361414
  • 22.0 ap361444
  • 22.0 ap361453
  • 22.0 ap361459
  • 22.0 ap361519
  • 22.0 ap361537
  • 22.0 ap361549
  • 22.0 ap361551
  • 22.0 ap361581
  • 22.0 ap361596
  • 22.0 ap361620
  • 22.0 ap361631
  • 22.0 ap361640
  • 22.0 ap361643
  • 22.0 ap361679
  • 22.0 ap361691
  • 22.0 ap361823
  • 22.0 ap361831
  • 22.0 ap361847
  • 22.0 ap361930
  • 22.0 ap361936
  • 22.0 ap361997
  • 22.0 ap361999
  • 22.0 ap362015
  • 22.0 ap362019
  • 22.0 ap362041
  • 22.0 ap362080
  • 22.0 ap362120
  • 22.0 ap362128
  • 22.0 ap362141
  • 22.0 ap362193
  • 22.0 ap362263
  • 22.0 ap362269
  • 22.0 ap362314
  • 22.0 ap362316
  • 22.0 ap362324
  • 22.0 ap362363
  • 22.0 ap362365
  • 22.0 ap362368
  • 22.0 ap362372
  • 22.0 ap362389
  • 22.0 ap362525
  • 22.0 ap362677
  • 22.0 ap362681
  • 22.0 ap362691
  • 22.0 ap362693
  • 22.0 ap362712
  • 22.0 ap362741
  • 22.0 ap362766
  • 22.0 ap362769
  • 22.0 ap362868
  • 22.0 ap363023
  • 22.0 ap363130
  • 22.0 ap363136
  • 22.0 ap363197
  • 22.0 ap363208
  • 22.0 ap363221
  • 22.0 ap363240
  • 22.0 ap363247
  • 22.0 ap363297
  • 22.0 ap363298
  • 22.0 ap363305
  • 22.0 ap363330
  • 22.0 ap363412
  • 22.0 ap363415
  • 22.0 ap363431
  • 22.0 ap363433
  • 22.0 ap363530
  • 22.0 ap363556
  • 22.0 ap363560
  • 22.0 ap363565
  • 22.0 ap363577
  • 22.0 ap363609
  • 22.0 ap363641
  • 22.0 ap363672
  • 22.0 ap363691
  • 22.0 ap363693
  • 22.0 ap363694
  • 22.0 ap363705
  • 22.0 ap363707
  • 22.0 ap363710
  • 22.0 ap363727
  • 22.0 ap363811
  • 22.0 ap363844
  • 22.0 ap363845
  • 22.0 ap363984
  • 22.0 ap364003
  • 22.0 ap364030
  • 22.0 ap364100
  • 22.0 ap364101
  • 22.0 ap364107
  • 22.0 ap364113
  • 22.0 ap364146
  • 22.0 ap364148
  • 22.0 ap364150
  • 22.0 ap364154
  • 22.0 ap364157
  • 22.0 ap364210
  • 22.0 ap364241
  • 22.0 ap364248
  • 22.0 ap364252
  • 22.0 ap364260
  • 22.0 ap364347
  • 22.0 ap364357
  • 22.0 ap364385
  • 22.0 ap364483
  • 22.0 ap364532
  • 22.0 ap364562
  • 22.0 ap364582
  • 22.0 ap364598
  • 22.0 ap364611
  • 22.0 ap364617
  • 22.0 ap364621
  • 22.0 ap364628
  • 22.0 ap364634
  • 22.0 ap364636
  • 22.0 ap364705
  • 22.0 ap364755
  • 22.0 ap364825
  • 22.0 ap365040
  • 22.0 ap365044
  • 22.0 ap365090
  • 22.0 ap365186
  • 22.0 ap365227
  • 22.0 ap365257
  • 22.0 ap365357
  • 22.0 ap365530
  • 22.0 ap365531
  • 22.0 ap365598
  • 22.0 ap365633
  • 22.0 ap365639
  • 22.0 ap365640
  • 22.0 ap365646
  • 22.0 ap365661
  • 22.0 ap365689
  • 22.0 ap365701
  • 22.0 ap365770
  • 22.0 ap365771
  • 22.0 ap365798
  • 22.0 ap365832
  • 22.0 ap365900
  • 22.0 ap365984
  • 22.0 ap366013
  • 22.0 ap366179
  • 22.0 ap366264
  • 22.0 ap366321
  • 22.0 ap366334
  • 22.0 ap366346
  • 22.0 ap366366
  • 22.0 ap366390
  • 22.0 ap366661
  • 22.0 ap366748
  • 22.0 ap366834
  • 22.0 ap366835
  • 22.0 ap366836
  • 22.0 ap366879
  • 22.0 ap366905
  • 22.0 ap366917
  • 22.0 ap366940
  • 22.0 ap366968
  • 22.0 ap366982
  • 22.0 ap366984
  • 22.0 ap366986
  • 22.0 ap366992
  • 22.0 ap366997
  • 22.0 ap367006
  • 22.0 ap367222
  • 22.0 ap367223
  • 22.0 ap367233
  • 22.0 ap367263
  • 22.0 ap384120
  • 22.0 ap367292
  • 22.0 ap367307
  • 22.0 ap367323
  • 22.0 ap367324
  • 22.0 ap367325
  • 22.0 ap367335
  • 22.0 ap367356
  • 22.0 ap367413
  • 22.0 ap367436
  • 22.0 ap367451
  • 22.0 ap367487
  • 22.0 ap367488
  • 22.0 ap367501
  • 22.0 ap367547
  • 22.0 ap367781
  • 22.0 ap367810
  • 22.0 ap367816
  • 22.0 ap367857
  • 22.0 ap367893
  • 22.0 ap367895
  • 22.0 ap367985
  • 22.0 ap367991
  • 22.0 ap367992
  • 22.0 ap368000
  • 22.0 ap368057
  • 22.0 ap368073
  • 22.0 ap368127
  • 22.0 ap368163
  • 22.0 ap368179
  • 22.0 ap368196
  • 22.0 ap368214
  • 22.0 ap368350
  • 22.0 ap368408
  • 22.0 ap368437
  • 22.0 ap368485
  • 22.0 ap368517
  • 22.0 ap368590
  • 22.0 ap368605
  • 22.0 ap368613
  • 22.0 ap368643
  • 22.0 ap368651
  • 22.0 ap368725
  • 22.0 ap368743
  • 22.0 ap368854
  • 22.0 ap368933
  • 22.0 ap369012
  • 22.0 ap369052
  • 22.0 ap369078
  • 22.0 ap369087
  • 22.0 ap369127
  • 22.0 ap369136
  • 22.0 ap369179
  • 22.0 ap369256
  • 22.0 ap369300
  • 22.0 ap369316
  • 22.0 ap369469
  • 22.0 ap369470
  • 22.0 ap369472
  • 22.0 ap369474
  • 22.0 ap369476
  • 22.0 ap369477
  • 22.0 ap369479
  • 22.0 ap369535
  • 22.0 ap369595
  • 22.0 ap369608
  • 22.0 ap369619
  • 22.0 ap369624
  • 22.0 ap369680
  • 22.0 ap369710
  • 22.0 ap369716
  • 22.0 ap369724
  • 22.0 ap369730
  • 22.0 ap369757
  • 22.0 ap369763
  • 22.0 ap369770
  • 22.0 ap369775
  • 22.0 ap369779
  • 22.0 ap369784
  • 22.0 ap369877
  • 22.0 ap369878
  • 22.0 ap369883
  • 22.0 ap369884
  • 22.0 ap369885
  • 22.0 ap369902
  • 22.0 ap369903
  • 22.0 ap369928
  • 22.0 ap370040
  • 22.0 ap370085
  • 22.0 ap370088
  • 22.0 ap370093
  • 22.0 ap370199
  • 22.0 ap370246
  • 22.0 ap370300
  • 22.0 ap370307
  • 22.0 ap370326
  • 22.0 ap370328
  • 22.0 ap370362
  • 22.0 ap370383
  • 22.0 ap370426
  • 22.0 ap370442
  • 22.0 ap370464
  • 22.0 ap370479
  • 22.0 ap370537
  • 22.0 ap370539
  • 22.0 ap370578
  • 22.0 ap370603
  • 22.0 ap370620
  • 22.0 ap370662
  • 22.0 ap370676
  • 22.0 ap370707
  • 22.0 ap370720
  • 22.0 ap370735
  • 22.0 ap370739
  • 22.0 ap370763
  • 22.0 ap370777
  • 22.0 ap370786
  • 22.0 ap370801
  • 22.0 ap370907
  • 22.0 ap370909
  • 22.0 ap370918
  • 22.0 ap370935
  • 22.0 ap371021
  • 22.0 ap371024
  • 22.0 ap371052
  • 22.0 ap371056
  • 22.0 ap371091
  • 22.0 ap371099
  • 22.0 ap371151
  • 22.0 ap371233
  • 22.0 ap371246
  • 22.0 ap371254
  • 22.0 ap371258
  • 22.0 ap371259
  • 22.0 ap371261
  • 22.0 ap371269
  • 22.0 ap371291
  • 22.0 ap371301
  • 22.0 ap371310
  • 22.0 ap371327
  • 22.0 ap371368
  • 22.0 ap371423
  • 22.0 ap371459
  • 22.0 ap371490
  • 22.0 ap371500
  • 22.0 ap371529
  • 22.0 ap371539
  • 22.0 ap371543
  • 22.0 ap371557
  • 22.0 ap371604
  • 22.0 ap371605
  • 22.0 ap371669
  • 22.0 ap371733
  • 22.0 ap371768
  • 22.0 ap371772
  • 22.0 ap371779
  • 22.0 ap371793
  • 22.0 ap371835
  • 22.0 ap371886
  • 22.0 ap371917
  • 22.0 ap371922
  • 22.0 ap371935
  • 22.0 ap371945
  • 22.0 ap371996
  • 22.0 ap371998
  • 22.0 ap372011
  • 22.0 ap372068
  • 22.0 ap372085
  • 22.0 ap372115
  • 22.0 ap372211
  • 22.0 ap372286
  • 22.0 ap372292
  • 22.0 ap372397
  • 22.0 ap372405
  • 22.0 ap372432
  • 22.0 ap372464
  • 22.0 ap372475
  • 22.0 ap372502
  • 22.0 ap372505
  • 22.0 ap372508
  • 22.0 ap372510
  • 22.0 ap372561
  • 22.0 ap372574
  • 22.0 ap372588
  • 22.0 ap372617
  • 22.0 ap372633
  • 22.0 ap372655
  • 22.0 ap372696
  • 22.0 ap372821
  • 22.0 ap372890
  • 22.0 ap372910
  • 22.0 ap372929
  • 22.0 ap372942
  • 22.0 ap372943
  • 22.0 ap372989
  • 22.0 ap373001
  • 22.0 ap373009
  • 22.0 ap373017
  • 22.0 ap373097
  • 22.0 ap373146
  • 22.0 ap373173
  • 22.0 ap373174
  • 22.0 ap373180
  • 22.0 ap373182
  • 22.0 ap373197
  • 22.0 ap373239
  • 22.0 ap373256
  • 22.0 ap373300
  • 22.0 ap373330
  • 22.0 ap373332
  • 22.0 ap373336
  • 22.0 ap373339
  • 22.0 ap373340
  • 22.0 ap373358
  • 22.0 ap373392
  • 22.0 ap373412
  • 22.0 ap373480
  • 22.0 ap373511
  • 22.0 ap373521
  • 22.0 ap373534
  • 22.0 ap373565
  • 22.0 ap373584
  • 22.0 ap373589
  • 22.0 ap373622
  • 22.0 ap373649
  • 22.0 ap373711
  • 22.0 ap373717
  • 22.0 ap373769
  • 22.0 ap373783
  • 22.0 ap373870
  • 22.0 ap373872
  • 22.0 ap373881
  • 22.0 ap373914
  • 22.0 ap373952
  • 22.0 ap373958
  • 22.0 ap374037
  • 22.0 ap374055
  • 22.0 ap374085
  • 22.0 ap374109
  • 22.0 ap374135
  • 22.0 ap374144
  • 22.0 ap374145
  • 22.0 ap374162
  • 22.0 ap374165
  • 22.0 ap374211
  • 22.0 ap374226
  • 22.0 ap374249
  • 22.0 ap374255
  • 22.0 ap374270
  • 22.0 ap374286
  • 22.0 ap374294
  • 22.0 ap374296
  • 22.0 ap374305
  • 22.0 ap374310
  • 22.0 ap374311
  • 22.0 ap374315
  • 22.0 ap374361
  • 22.0 ap374414
  • 22.0 ap374421
  • 22.0 ap374454
  • 22.0 ap374472
  • 22.0 ap374493
  • 22.0 ap374498
  • 22.0 ap374528
  • 22.0 ap374530
  • 22.0 ap374548
  • 22.0 ap374583
  • 22.0 ap374605
  • 22.0 ap374609
  • 22.0 ap374641
  • 22.0 ap374643
  • 22.0 ap374691
  • 22.0 ap374695
  • 22.0 ap374723
  • 22.0 ap374785
  • 22.0 ap374793
  • 22.0 ap374794
  • 22.0 ap374820
  • 22.0 ap374832
  • 22.0 ap374869
  • 22.0 ap374892
  • 22.0 ap374917
  • 22.0 ap374935
  • 22.0 ap374943
  • 22.0 ap374956
  • 22.0 ap375004
  • 22.0 ap375021
  • 22.0 ap375036
  • 22.0 ap375039
  • 22.0 ap375041
  • 22.0 ap375205
  • 22.0 ap375207
  • 22.0 ap375210
  • 22.0 ap375214
  • 22.0 ap375240
  • 22.0 ap375260
  • 22.0 ap375270
  • 22.0 ap375273
  • 22.0 ap375289
  • 22.0 ap375293
  • 22.0 ap375317
  • 22.0 ap375335
  • 22.0 ap375342
  • 22.0 ap375351
  • 22.0 ap375353
  • 22.0 ap375370
  • 22.0 ap375398
  • 22.0 ap375409
  • 22.0 ap375412
  • 22.0 ap375414
  • 22.0 ap375421
  • 22.0 ap375424
  • 22.0 ap375425
  • 22.0 ap375430
  • 22.0 ap375432
  • 22.0 ap375453
  • 22.0 ap375469
  • 22.0 ap375484
  • 22.0 ap375488
  • 22.0 ap375489
  • 22.0 ap375514
  • 22.0 ap375515
  • 22.0 ap375518
  • 22.0 ap375539
  • 22.0 ap375603
  • 22.0 ap375624
  • 22.0 ap375650
  • 22.0 ap375700
  • 22.0 ap375711
  • 22.0 ap375748
  • 22.0 ap375756
  • 22.0 ap375757
  • 22.0 ap375785
  • 22.0 ap375787
  • 22.0 ap375804
  • 22.0 ap375828
  • 22.0 ap375849
  • 22.0 ap375860
  • 22.0 ap375902
  • 22.0 ap375950
  • 22.0 ap375959
  • 22.0 ap375982
  • 22.0 ap375989
  • 22.0 ap375996
  • 22.0 ap376012
  • 22.0 ap376024
  • 22.0 ap376042
  • 22.0 ap376099
  • 22.0 ap376156
  • 22.0 ap376189
  • 22.0 ap376205
  • 22.0 ap376213
  • 22.0 ap376220
  • 22.0 ap376317
  • 22.0 ap376373
  • 22.0 ap376384
  • 22.0 ap376387
  • 22.0 ap376414
  • 22.0 ap376445
  • 22.0 ap376486
  • 22.0 ap376512
  • 22.0 ap376529
  • 22.0 ap376594
  • 22.0 ap376613
  • 22.0 ap376622
  • 22.0 ap376666
  • 22.0 ap376696
  • 22.0 ap376699
  • 22.0 ap376704
  • 22.0 ap376722
  • 22.0 ap376736
  • 22.0 ap376787
  • 22.0 ap376798
  • 22.0 ap376809
  • 22.0 ap376818
  • 22.0 ap376820
  • 22.0 ap376878
  • 22.0 ap376889
  • 22.0 ap376934
  • 22.0 ap376945
  • 22.0 ap376956
  • 22.0 ap376979
  • 22.0 ap377033
  • 22.0 ap377050
  • 22.0 ap377091
  • 22.0 ap377109
  • 22.0 ap377120
  • 22.0 ap377163
  • 22.0 ap377175
  • 22.0 ap377177
  • 22.0 ap377229
  • 22.0 ap377319
  • 22.0 ap377423
  • 22.0 ap377505
  • 22.0 ap377517
  • 22.0 ap377538
  • 22.0 ap377555
  • 22.0 ap377569
  • 22.0 ap377630
  • 22.0 ap377670
  • 22.0 ap377687
  • 22.0 ap377718
  • 22.0 ap377723
  • 22.0 ap377737
  • 22.0 ap377751
  • 22.0 ap377868
  • 22.0 ap377878
  • 22.0 ap377888
  • 22.0 ap377966
  • 22.0 ap377986
  • 22.0 ap378014
  • 22.0 ap378029
  • 22.0 ap378047
  • 22.0 ap378051
  • 22.0 ap378070
  • 22.0 ap378087
  • 22.0 ap378122
  • 22.0 ap378141
  • 22.0 ap378142
  • 22.0 ap378144
  • 22.0 ap378154
  • 22.0 ap378168
  • 22.0 ap378178
  • 22.0 ap378227
  • 22.0 ap378234
  • 22.0 ap378242
  • 22.0 ap378248
  • 22.0 ap378258
  • 22.0 ap378372
  • 22.0 ap378383
  • 22.0 ap378390
  • 22.0 ap378415
  • 22.0 ap378481
  • 22.0 ap378535
  • 22.0 ap378553
  • 22.0 ap378575
  • 22.0 ap378595
  • 22.0 ap378818
  • 22.0 ap378827
  • 22.0 ap378886
  • 22.0 ap378902
  • 22.0 ap378913
  • 22.0 ap378920
  • 22.0 ap378952
  • 22.0 ap378985
  • 22.0 ap378991
  • 22.0 ap378995
  • 22.0 ap379091
  • 22.0 ap379105
  • 22.0 ap379112
  • 22.0 ap379140
  • 22.0 ap379152
  • 22.0 ap379168
  • 22.0 ap379187
  • 22.0 ap379190
  • 22.0 ap379327
  • 22.0 ap379339
  • 22.0 ap379346
  • 22.0 ap379373
  • 22.0 ap379390
  • 22.0 ap379391
  • 22.0 ap379411
  • 22.0 ap379423
  • 22.0 ap379449
  • 22.0 ap379501
  • 22.0 ap379511
  • 22.0 ap379532
  • 22.0 ap379533
  • 22.0 ap379535
  • 22.0 ap379600
  • 22.0 ap379616
  • 22.0 ap379627
  • 22.0 ap379635
  • 22.0 ap379781
  • 22.0 ap379830
  • 22.0 ap379855
  • 22.0 ap379903
  • 22.0 ap379921
  • 22.0 ap379925
  • 22.0 ap379957
  • 22.0 ap379963
  • 22.0 ap380109
  • 22.0 ap380249
  • 22.0 ap380256
  • 22.0 ap380264
  • 22.0 ap380282
  • 22.0 ap380355
  • 22.0 ap380375
  • 22.0 ap380465
  • 22.0 ap380581
  • 22.0 ap380608
  • 22.0 ap380692
  • 22.0 ap380758
  • 22.0 ap380762
  • 22.0 ap380766
  • 22.0 ap380772
  • 22.0 ap380775
  • 22.0 ap380782
  • 22.0 ap380802
  • 22.0 ap380840
  • 22.0 ap380939
  • 22.0 ap381051
  • 22.0 ap381078
  • 22.0 ap381081
  • 22.0 ap381108
  • 22.0 ap381247
  • 22.0 ap381269
  • 22.0 ap381292
  • 22.0 ap381300
  • 22.0 ap381334
  • 22.0 ap381339
  • 22.0 ap381358
  • 22.0 ap381385
  • 22.0 ap381398
  • 22.0 ap381543
  • 22.0 ap381570
  • 22.0 ap381575
  • 22.0 ap381596
  • 22.0 ap381600
  • 22.0 ap381611
  • 22.0 ap381616
  • 22.0 ap381621
  • 22.0 ap381623
  • 22.0 ap381624
  • 22.0 ap381657
  • 22.0 ap381734
  • 22.0 ap381775
  • 22.0 ap381809
  • 22.0 ap381825
  • 22.0 ap381878
  • 22.0 ap382231
  • 22.0 ap382412
  • 22.0 ap382441
  • 22.0 ap382691
  • 22.0 ap382692
  • 22.0 ap382836
  • 22.0 ap382869
  • 22.0 ap382873
  • 22.0 ap382894
  • 22.0 ap382929
  • 22.0 ap382935
  • 22.0 ap382965
  • 22.0 ap382969
  • 22.0 ap382994
  • 22.0 ap383105
  • 22.0 ap383126
  • 22.0 ap383147
  • 22.0 ap383178
  • 22.0 ap383188
  • 22.0 ap383331
  • 22.0 ap383682
  • RI.2021.02
  • RI.2021.08
  • RI.2021.09
  • RI.2021.10
  • RI.2021.11
  • RI.2021.12
  • RI.2022.02
  • RI.2022.03
  • RI.2022.04
  • RI.2022.07
  • RI.2022.06
  • RI.2022.05
  • RI.2022.09
  • RI.2022.12
Problem Types
TypeCWE IDDescription
cweCWE-918Server-Side Request Forgery (SSRF)
Type: cwe
CWE ID: CWE-918
Description: Server-Side Request Forgery (SSRF)
Metrics
VersionBase scoreBase severityVector
3.17.7HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Version: 3.1
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp
x_transferred
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ykramarz@cisco.com
Published At:04 Nov, 2022 | 18:15
Updated At:25 Jan, 2024 | 17:15

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Secondary3.17.7HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>broadworks_messaging_server>>Versions before 23.0(exclusive)
cpe:2.3:a:cisco:broadworks_messaging_server:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-918Primarynvd@nist.gov
CWE-918Secondaryykramarz@cisco.com
CWE ID: CWE-918
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-918
Type: Secondary
Source: ykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfppykramarz@cisco.com
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp
Source: ykramarz@cisco.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

197Records found

CVE-2020-3252
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-7.01% / 91.09%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 20:11
Updated-15 Nov, 2024 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Vulnerabilities in Cisco UCS Director and Cisco UCS Director Express for Big Data

Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ucs_directorucs_director_express_for_big_dataCisco UCS Director
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-20942
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 32.72%
||
7 Day CHG~0.00%
Published-03 Nov, 2022 | 19:30
Updated-03 Aug, 2024 | 02:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to retrieve sensitive information from an affected device, including user credentials. This vulnerability is due to weak enforcement of back-end authorization checks. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain confidential data that is stored on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_and_web_managerasyncossecure_email_gatewaysecure_web_applianceCisco Secure Web ApplianceCisco Secure Email and Web ManagerCisco Secure Email
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-20664
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.7||HIGH
EPSS-0.37% / 58.27%
||
7 Day CHG-0.01%
Published-15 Jun, 2022 | 17:55
Updated-06 Nov, 2024 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance and Cisco Secure Email and Web Manager Information Disclosure Vulnerability

A vulnerability in the web management interface of Cisco Secure Email and Web Manager, formerly Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an authenticated, remote attacker to retrieve sensitive information from a Lightweight Directory Access Protocol (LDAP) external authentication server connected to an affected device. This vulnerability is due to a lack of proper input sanitization while querying the external authentication server. An attacker could exploit this vulnerability by sending a crafted query through an external authentication web page. A successful exploit could allow the attacker to gain access to sensitive information, including user credentials from the external authentication server. To exploit this vulnerability, an attacker would need valid operator-level (or higher) credentials.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_and_web_manageremail_security_applianceCisco Email Security Appliance (ESA)
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-20807
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.21% / 43.31%
||
7 Day CHG~0.00%
Published-27 May, 2022 | 14:07
Updated-06 Nov, 2024 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities

Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to write files or disclose sensitive information on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_video_communication_serverCisco TelePresence Video Communication Server (VCS) Expressway
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2021-40123
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.05% / 14.03%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 02:50
Updated-07 Nov, 2024 | 21:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine File Download Vulnerability

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker with administrative read-only privileges to download files that should be restricted. This vulnerability is due to incorrect permissions settings on an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the device. A successful exploit could allow the attacker to download files that should be restricted.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2022-20747
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.41% / 60.33%
||
7 Day CHG~0.00%
Published-15 Apr, 2022 | 14:20
Updated-06 Nov, 2024 | 16:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Information Disclosure Vulnerability

A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API request to Cisco vManage as a lower-privileged user and gaining access to sensitive information that they would not normally be authorized to access.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_vmanagecatalyst_sd-wan_managerCisco SD-WAN vManage
CWE ID-CWE-202
Exposure of Sensitive Information Through Data Queries
CVE-2022-20810
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 37.75%
||
7 Day CHG~0.00%
Published-30 Sep, 2022 | 18:45
Updated-01 Nov, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability

A vulnerability in the Simple Network Management Protocol (SNMP) of Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family could allow an authenticated, remote attacker to access sensitive information. This vulnerability is due to insufficient restrictions that allow a sensitive configuration detail to be disclosed. An attacker could exploit this vulnerability by retrieving data through SNMP read-only community access. A successful exploit could allow the attacker to view Service Set Identifier (SSID) preshared keys (PSKs) that are configured on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xecatalyst_9800-lcatalyst_9800-40_wireless_controllercatalyst_9800-40catalyst_9800-l-ccatalyst_9800-80_wireless_controllercatalyst_9800_embedded_wireless_controllercatalyst_9800catalyst_9800-clcatalyst_9800-80catalyst_9800-l-fCisco IOS XE Software
CWE ID-CWE-202
Exposure of Sensitive Information Through Data Queries
CVE-2022-20819
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.17% / 38.91%
||
7 Day CHG-0.18%
Published-15 Jun, 2022 | 17:55
Updated-01 Nov, 2024 | 19:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability exists because administrative privilege levels for sensitive data are not properly enforced. An attacker with read-only privileges for the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information about the system configuration.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-269
Improper Privilege Management
CVE-2022-20680
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.31% / 53.50%
||
7 Day CHG~0.00%
Published-10 Feb, 2022 | 17:06
Updated-06 Nov, 2024 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Prime Service Catalog Information Disclosure Vulnerability

A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to improper enforcement of Administrator privilege levels for low-value sensitive data. An attacker with read-only Administrator access to the web-based management interface could exploit this vulnerability by sending a malicious HTTP request to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information about users of the system and orders that have been placed using the application.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_service_catalogCisco Prime Service Catalog
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-26065
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.28% / 50.85%
||
7 Day CHG~0.00%
Published-04 Aug, 2023 | 20:51
Updated-09 Oct, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to view arbitrary files on the affected system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_sd-wan_managerCisco SD-WAN vManage
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-20131
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.11% / 30.44%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-25 Oct, 2024 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow a remote attacker to obtain privileged information and conduct cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureevolved_programmable_network_managerCisco Prime Infrastructure
CWE ID-CWE-27
Path Traversal: 'dir/../../filename'
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-20782
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.17% / 38.91%
||
7 Day CHG~0.00%
Published-06 Apr, 2022 | 18:11
Updated-06 Nov, 2024 | 16:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability is due to improper enforcement of administrative privilege levels for high-value sensitive data. An attacker with read-only Administrator privileges to the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-269
Improper Privilege Management
CVE-2022-20791
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.51% / 65.44%
||
7 Day CHG-0.02%
Published-06 Jul, 2022 | 20:30
Updated-06 Nov, 2024 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Communications Products Arbitrary File Read Vulnerability

A vulnerability in the database user privileges of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device. This vulnerability is due to insufficient file permission restrictions. An attacker could exploit this vulnerability by sending a crafted command from the API to the application. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_manager_im_and_presence_serviceunified_communications_managerCisco Unified Communications Manager
CWE ID-CWE-36
Absolute Path Traversal
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-20790
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.64% / 69.54%
||
7 Day CHG~0.00%
Published-21 Apr, 2022 | 18:50
Updated-06 Nov, 2024 | 16:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Communications Products Arbitrary File Read Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the underlying operating system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_managerCisco Unified Communications Manager
CWE ID-CWE-23
Relative Path Traversal
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-20744
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.18% / 40.35%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 03:20
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Management Center Software Information Disclosure Vulnerability

A vulnerability in the input protection mechanisms of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view data without proper authorization. This vulnerability exists because of a protection mechanism that relies on the existence or values of a specific input. An attacker could exploit this vulnerability by modifying this input to bypass the protection mechanism and sending a crafted request to an affected device. A successful exploit could allow the attacker to view data beyond the scope of their authorization.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Management Center
CWE ID-CWE-807
Reliance on Untrusted Inputs in a Security Decision
CVE-2022-20809
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.27% / 49.83%
||
7 Day CHG~0.00%
Published-26 May, 2022 | 14:00
Updated-06 Nov, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities

Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to write files or disclose sensitive information on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_video_communication_serverCisco TelePresence Video Communication Server (VCS) Expressway
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2019-1820
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-13.89% / 94.05%
||
7 Day CHG-0.61%
Published-16 May, 2019 | 01:10
Updated-21 Nov, 2024 | 19:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Prime Infrastructure and Evolved Programmable Network Manager Path Traversal Vulnerability

A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager software could allow an authenticated, remote attacker to download and view files within the application that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view application files that may contain sensitive information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureevolved_programmable_network_managerCisco Prime Infrastructure
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-1953
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 43.79%
||
7 Day CHG~0.00%
Published-08 Aug, 2019 | 07:30
Updated-21 Nov, 2024 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Enterprise NFV Infrastructure Software Password Recovery Vulnerability

A vulnerability in the web portal of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to view a password in clear text. The vulnerability is due to incorrectly logging the admin password when a user is forced to modify the default password when logging in to the web portal for the first time. Subsequent password changes are not logged and other accounts are not affected. An attacker could exploit this vulnerability by viewing the admin clear text password and using it to access the affected system. The attacker would need a valid user account to exploit this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-enterprise_network_function_virtualization_infrastructureCisco Enterprise NFV Infrastructure Software
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2019-1818
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-13.89% / 94.05%
||
7 Day CHG-0.61%
Published-16 May, 2019 | 01:10
Updated-21 Nov, 2024 | 19:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Prime Infrastructure and Evolved Programmable Network Manager Path Traversal Vulnerability

A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager software could allow an authenticated, remote attacker to download and view files within the application that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view application files that may contain sensitive information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureevolved_programmable_network_managerCisco Prime Infrastructure
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-1819
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-13.89% / 94.05%
||
7 Day CHG-0.61%
Published-16 May, 2019 | 01:10
Updated-21 Nov, 2024 | 19:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Prime Infrastructure and Evolved Programmable Network Manager Path Traversal Vulnerability

A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager software could allow an authenticated, remote attacker to download and view files within the application that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view application files that may contain sensitive information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureevolved_programmable_network_managerCisco Prime Infrastructure
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-1627
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.15% / 36.82%
||
7 Day CHG~0.00%
Published-20 Jun, 2019 | 02:50
Updated-21 Nov, 2024 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Integrated Management Controller Information Disclosure Vulnerability

A vulnerability in the Server Utilities of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to gain unauthorized access to sensitive user information from the configuration data that is stored on the affected system. The vulnerability is due to insufficient protection of data in the configuration file. An attacker could exploit this vulnerability by downloading the configuration file. An exploit could allow the attacker to use the sensitive information from the file to elevate privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_computing_systemintegrated_management_controllerCisco Unified Computing System (Management Software)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2019-15257
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.48% / 64.22%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 18:36
Updated-21 Nov, 2024 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SPA100 Series Analog Telephone Adapters Running Configuration Information Disclosure Vulnerability

A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to improper restrictions on configuration information. An attacker could exploit this vulnerability by sending a request to an affected device through the web-based management interface. A successful exploit could allow the attacker to return running configuration information that could also include sensitive information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-spa112_firmwarespa122_firmwarespa112spa122Cisco SPA112 2-Port Phone Adapter
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-34712
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.07% / 22.58%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 02:26
Updated-07 Nov, 2024 | 21:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Cypher Query Language Injection Vulnerability

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct cypher query language injection attacks on an affected system. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the interface of an affected system. A successful exploit could allow the attacker to obtain sensitive information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_vmanagecatalyst_sd-wan_managerCisco SD-WAN vManage
CWE ID-CWE-943
Improper Neutralization of Special Elements in Data Query Logic
CVE-2019-15963
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.21% / 43.15%
||
7 Day CHG~0.00%
Published-23 Sep, 2020 | 00:27
Updated-13 Nov, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Communications Manager Information Disclosure Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view sensitive information in the web-based management interface of the affected software. The vulnerability is due to insufficient protection of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by accessing the interface and viewing restricted portions of the software configuration. A successful exploit could allow the attacker to gain access to sensitive information or conduct further attacks.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_managerCisco Unity Connection
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-15255
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 42.26%
||
7 Day CHG~0.00%
Published-26 Jan, 2020 | 04:45
Updated-15 Nov, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Authorization Bypass Vulnerability

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access sensitive information related to the device. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to sensitive information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-284
Improper Access Control
CVE-2019-12708
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.48% / 64.22%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 18:36
Updated-21 Nov, 2024 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SPA100 Series Analog Telephone Adapters Administrative Credentials Information Disclosure Vulnerability

A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to unsafe handling of user credentials. An attacker could exploit this vulnerability by viewing portions of the web-based management interface of an affected device. A successful exploit could allow the attacker to access administrative credentials and potentially gain elevated privileges by reusing stolen credentials on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-spa112_firmwarespa122_firmwarespa112spa122Cisco SPA112 2-Port Phone Adapter
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-12704
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.28% / 50.93%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 18:36
Updated-21 Nov, 2024 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SPA100 Series Analog Telephone Adapters Web-Based Management Interface File Disclosure Vulnerability

A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to view the contents of arbitrary files on an affected device. The vulnerability is due to improper input validation in the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve the contents of arbitrary files on the device, possibly resulting in the disclosure of sensitive information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-spa112_firmwarespa122_firmwarespa112spa122Cisco SPA112 2-Port Phone Adapter
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-3437
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-1.23% / 78.35%
||
7 Day CHG~0.00%
Published-16 Jul, 2020 | 17:22
Updated-13 Nov, 2024 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Information Disclosure Vulnerability

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of the device. The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files from the filesystem of the underlying operating system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_firmwareCisco SD-WAN vManage
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2020-3498
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.32% / 53.99%
||
7 Day CHG~0.00%
Published-04 Sep, 2020 | 02:25
Updated-13 Nov, 2024 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Jabber for Windows Information Disclosure Vulnerability

A vulnerability in Cisco Jabber software could allow an authenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of message contents. An attacker could exploit this vulnerability by sending specially crafted messages to a targeted system. A successful exploit could allow the attacker to cause the application to return sensitive authentication information to another system, possibly for use in further attacks.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-jabberCisco Jabber
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3547
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.18% / 39.44%
||
7 Day CHG~0.00%
Published-04 Sep, 2020 | 02:26
Updated-13 Nov, 2024 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability

A vulnerability in the web-based management interface of Cisco AsyncOS software for Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability exists because an insecure method is used to mask certain passwords on the web-based management interface. An attacker could exploit this vulnerability by looking at the raw HTML code that is received from the interface. A successful exploit could allow the attacker to obtain some of the passwords configured throughout the interface.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-content_security_management_applianceasyncosemail_security_applianceweb_security_applianceCisco Web Security Appliance (WSA)
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-1355
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.40% / 59.85%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 20:00
Updated-12 Nov, 2024 | 20:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Communications Products Vulnerabilities

Multiple vulnerabilities in Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an attacker to conduct path traversal attacks and SQL injection attacks on an affected system. One of the SQL injection vulnerabilities that affects Unified CM IM&P also affects Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) and could allow an attacker to conduct SQL injection attacks on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_manager_im_and_presence_serviceunified_communications_managerCisco Unified Communications Manager
CWE ID-CWE-35
Path Traversal: '.../...//'
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2021-1145
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 49.33%
||
7 Day CHG~0.00%
Published-13 Jan, 2021 | 21:45
Updated-12 Nov, 2024 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco StarOS for Cisco ASR 5000 Series Routers Arbitrary File Read Vulnerability

A vulnerability in the Secure FTP (SFTP) of Cisco StarOS for Cisco ASR 5000 Series Routers could allow an authenticated, remote attacker to read arbitrary files on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the affected device. The vulnerability is due to insecure handling of symbolic links. An attacker could exploit this vulnerability by sending a crafted SFTP command to an affected device. A successful exploit could allow the attacker to read arbitrary files on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-starosasr_5000asr_5500asr_5700Cisco ASR 5000 Series Software
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2021-1282
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.31% / 53.51%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 19:56
Updated-12 Nov, 2024 | 20:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Communications Products Vulnerabilities

Multiple vulnerabilities in Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an attacker to conduct path traversal attacks and SQL injection attacks on an affected system. One of the SQL injection vulnerabilities that affects Unified CM IM&P also affects Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) and could allow an attacker to conduct SQL injection attacks on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_manager_im_and_presence_serviceunified_communications_managerCisco Unified Communications Manager
CWE ID-CWE-35
Path Traversal: '.../...//'
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2023-20002
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.51%
||
7 Day CHG~0.00%
Published-19 Jan, 2023 | 01:40
Updated-02 Aug, 2024 | 08:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-roomostelepresence_collaboration_endpointCisco TelePresence Endpoint Software (TC/CE)Cisco RoomOS Software
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-20531
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 26.69%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:31
Updated-20 Nov, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine XML External Entity Injection Vulnerability

A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device and conduct a server-side request forgery (SSRF) attack through an affected device. To exploit this vulnerability, the attacker would need valid Super Admin credentials. This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing XML input. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system or conduct an SSRF attack through the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-20404
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-39.64% / 97.20%
||
7 Day CHG~0.00%
Published-05 Jun, 2024 | 16:14
Updated-01 Aug, 2024 | 21:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system. This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-finesseCisco Unified Contact Center EnterpriseCisco Packaged Contact Center EnterpriseCisco Unified Contact Center ExpressCisco Finesse
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-20332
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 22.85%
||
7 Day CHG+0.02%
Published-03 Apr, 2024 | 16:22
Updated-26 Aug, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device. To successfully exploit this vulnerability, the attacker would need valid Super Admin credentials.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2018-0403
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.69% / 70.82%
||
7 Day CHG~0.00%
Published-18 Jul, 2018 | 23:00
Updated-29 Nov, 2024 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to retrieve a cleartext password. Cisco Bug IDs: CSCvg71040.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_contact_center_expressunified_ip_interactive_voice_responseCisco Unified Contact Center Express unknown
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2018-0399
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.72% / 71.45%
||
7 Day CHG~0.00%
Published-18 Jul, 2018 | 23:00
Updated-29 Nov, 2024 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to retrieve a cleartext password from an affected system. Cisco Bug IDs: CSCvg71044.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-finesseCisco Finesse unknown
CWE ID-CWE-264
Not Available
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2018-0398
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.96% / 75.55%
||
7 Day CHG~0.00%
Published-18 Jul, 2018 | 23:00
Updated-29 Nov, 2024 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a server-side request forgery (SSRF) attack. Cisco Bug IDs: CSCvg71018.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-finesseCisco Finesse unknown
CWE ID-CWE-264
Not Available
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-1272
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-0.20% / 41.99%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 19:56
Updated-12 Nov, 2024 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Data Center Network Manager Server-Side Request Forgery Vulnerability

A vulnerability in the session validation feature of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system. This vulnerability is due to insufficient validation of parameters in a specific HTTP request by an attacker. An attacker could exploit this vulnerability by sending a crafted HTTP request to an authenticated user of the DCNM web application. A successful exploit could allow the attacker to bypass access controls and gain unauthorized access to the Device Manager application, which provides access to network devices managed by the system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-data_center_network_managerCisco Data Center Network Manager
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-20288
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.01% / 1.66%
||
7 Day CHG~0.00%
Published-16 Jul, 2025 | 16:16
Updated-22 Jul, 2025 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_intelligence_centerunified_contact_center_expressCisco Unified Intelligence CenterCisco Unified Contact Center Express
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-20958
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.3||HIGH
EPSS-0.64% / 69.47%
||
7 Day CHG~0.00%
Published-03 Nov, 2022 | 19:26
Updated-03 Aug, 2024 | 02:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an unauthenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-broadworks_commpilot_applicationCisco BroadWorks
CWE ID-CWE-36
Absolute Path Traversal
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2019-1872
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.38% / 58.32%
||
7 Day CHG~0.00%
Published-05 Jun, 2019 | 16:30
Updated-19 Nov, 2024 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco TelePresence Video Communication Server and Cisco Expressway Series Server-Side Request Forgery Vulnerability

A vulnerability in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway Series software could allow an unauthenticated, remote attacker to cause an affected system to send arbitrary network requests. The vulnerability is due to improper restrictions on network services in the affected software. An attacker could exploit this vulnerability by sending malicious requests to the affected system. A successful exploit could allow the attacker to send arbitrary network requests sourced from the affected system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_video_communication_serverCisco TelePresence Video Communication Server (VCS)
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2019-1679
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.14% / 34.08%
||
7 Day CHG~0.00%
Published-07 Feb, 2019 | 21:00
Updated-21 Nov, 2024 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco TelePresence Conductor, Cisco Expressway Series, and Cisco TelePresence Video Communication Server REST API Server-Side Request Forgery Vulnerability

A vulnerability in the web interface of Cisco TelePresence Conductor, Cisco Expressway Series, and Cisco TelePresence Video Communication Server (VCS) Software could allow an authenticated, remote attacker to trigger an HTTP request from an affected server to an arbitrary host. This type of attack is commonly referred to as server-side request forgery (SSRF). The vulnerability is due to insufficient access controls for the REST API of Cisco Expressway Series and Cisco TelePresence VCS. An attacker could exploit this vulnerability by submitting a crafted HTTP request to the affected server. Versions prior to XC4.3.4 are affected.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_conductortelepresence_video_communication_serverCisco TelePresence ConductorCisco Expressway SeriesCisco TelePresence Video Communication Server
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2019-12632
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.56% / 67.44%
||
7 Day CHG~0.00%
Published-05 Sep, 2019 | 01:15
Updated-19 Nov, 2024 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Finesse Request Processing Server-Side Request Forgery Vulnerability

A vulnerability in Cisco Finesse could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on an affected system. The vulnerability exists because the affected system does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to access the system and perform unauthorized actions.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-finesseCisco Finesse
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2019-12633
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.51% / 65.56%
||
7 Day CHG~0.00%
Published-05 Sep, 2019 | 01:15
Updated-19 Nov, 2024 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Contact Center Express Request Processing Server-Side Request Forgery Vulnerability

A vulnerability in Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system. The vulnerability is due to improper validation of user-supplied input on the affected system. An attacker could exploit this vulnerability by sending the user of the web application a crafted request. If the request is processed, the attacker could access the system and perform unauthorized actions.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_contact_center_expressCisco Unified Contact Center Express
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-39195
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.7||HIGH
EPSS-0.24% / 46.88%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 19:00
Updated-04 Aug, 2024 | 01:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery vulnerability in misskey

Misskey is an open source, decentralized microblogging platform. In affected versions a Server-Side Request Forgery vulnerability exists in "Upload from URL" and remote attachment handling. This could result in the disclosure of non-public information within the internal network. This has been fixed in 12.90.0. However, if you are using a proxy, you will need to take additional measures. As a workaround this exploit may be avoided by appropriately restricting access to private networks from the host where the application is running.

Action-Not Available
Vendor-misskeymisskey-dev
Product-misskeymisskey
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2010-1637
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 34.23%
||
7 Day CHG~0.00%
Published-22 Jun, 2010 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.

Action-Not Available
Vendor-n/aFedora ProjectApple Inc.Red Hat, Inc.SquirrelMail
Product-fedoraenterprise_linux_workstationenterprise_linux_serverenterprise_linux_desktopsquirrelmailmac_os_xmac_os_x_servern/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-24888
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.4||MEDIUM
EPSS-0.32% / 54.62%
||
7 Day CHG+0.08%
Published-02 Apr, 2024 | 18:16
Updated-07 Feb, 2025 | 16:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Gutenberg Blocks by Kadence Blocks plugin <= 3.2.25 - Server Side Request Forgery (SSRF) vulnerability

Server-Side Request Forgery (SSRF) vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks.This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.2.25.

Action-Not Available
Vendor-Kadence WP
Product-gutenberg_blocks_with_aiGutenberg Blocks by Kadence Blocks
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found