Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-20951

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-03 Nov, 2022 | 19:26
Updated At-25 Oct, 2024 | 16:05
Rejected At-
Credits

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:03 Nov, 2022 | 19:26
Updated At:25 Oct, 2024 | 16:05
Rejected At:
▼CVE Numbering Authority (CNA)

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco BroadWorks
Versions
Affected
  • 24.0 ap375672
  • 24.0 ap375655
  • 24.0 ap376979
  • 24.0 ap379112
  • 24.0 ap379588
  • 24.0 ap378485
  • 24.0 ap376934
  • 24.0 ap379533
  • 24.0 ap374230
  • 24.0 ap378382
  • 24.0 ap375720
  • 24.0 ap378575
  • 24.0 ap378248
  • 24.0 ap378990
  • 24.0 ap378425
  • 24.0 ap377319
  • 24.0 ap378818
  • 24.0 ap375453
  • 24.0 ap376317
  • 24.0 ap376677
  • 24.0 ap375688
  • 24.0 ap377147
  • 24.0 ap376945
  • 24.0 ap377517
  • 24.0 ap376205
  • 24.0 ap378257
  • 24.0 ap378471
  • 24.0 ap376669
  • 24.0 ap375756
  • 24.0 ap378440
  • 24.0 ap376486
  • 24.0 ap378920
  • 24.0 ap375734
  • 24.0 ap378144
  • 24.0 ap375036
  • 24.0 ap375624
  • 24.0 ap378882
  • 24.0 ap376531
  • 24.0 ap375804
  • 24.0 ap376137
  • 24.0 ap377378
  • 24.0 ap376844
  • 24.0 ap376696
  • 24.0 ap378599
  • 24.0 ap378880
  • 24.0 ap374530
  • 24.0 ap375369
  • 24.0 ap376147
  • 24.0 ap376140
  • 24.0 ap379501
  • 24.0 ap378150
  • 24.0 ap375100
  • 24.0 ap376622
  • 24.0 ap379339
  • 24.0 ap377163
  • 24.0 ap375464
  • 24.0 ap376023
  • 24.0 ap378164
  • 24.0 ap378154
  • 24.0 ap377068
  • 24.0 ap377177
  • 24.0 ap377091
  • 24.0 ap377515
  • 24.0 ap379190
  • 24.0 ap378595
  • 24.0 ap374832
  • 24.0 ap367206
  • 24.0 ap377868
  • 24.0 ap378902
  • 24.0 ap375210
  • 24.0 ap375353
  • 24.0 ap376098
  • 24.0 ap378383
  • 24.0 ap379122
  • 24.0 ap376710
  • 24.0 ap376602
  • 24.0 ap378535
  • 24.0 ap377729
  • 24.0 ap375990
  • 24.0 ap375748
  • 24.0 ap376935
  • 24.0 ap376426
  • 24.0 ap375743
  • 24.0 ap379109
  • 24.0 ap378080
  • 24.0 ap375449
  • 24.0 ap375922
  • 24.0 ap377984
  • 24.0 ap379391
  • 24.0 ap379378
  • 24.0 ap376512
  • 24.0 ap376956
  • 24.0 ap369855
  • 24.0 ap379098
  • 24.0 ap376736
  • 24.0 ap377674
  • 24.0 ap375625
  • 24.0 ap378393
  • 24.0 ap376620
  • 24.0 ap372799
  • 24.0 ap378976
  • 24.0 ap376989
  • 24.0 ap378862
  • 24.0 ap378242
  • 24.0 ap375489
  • 24.0 ap379475
  • 24.0 ap376820
  • 24.0 ap375533
  • 24.0 ap376308
  • 24.0 ap376798
  • 24.0 ap375661
  • 24.0 ap378953
  • 24.0 ap371233
  • 24.0 ap377628
  • 24.0 ap375266
  • 24.0 ap376984
  • 24.0 ap375021
  • 24.0 ap377966
  • 24.0 ap375484
  • 24.0 ap378436
  • 24.0 ap378886
  • 24.0 ap375709
  • 24.0 ap376267
  • 24.0 ap375514
  • 24.0 ap377743
  • 24.0 ap377878
  • 24.0 ap378308
  • 24.0 ap379487
  • 24.0 ap376038
  • 24.0 ap377802
  • 24.0 ap376507
  • 24.0 ap377630
  • 24.0 ap378913
  • 24.0 ap376252
  • 24.0 ap376407
  • 24.0 ap376410
  • 24.0 ap376523
  • 24.0 ap375342
  • 24.0 ap375304
  • 24.0 ap378553
  • 24.0 ap375205
  • 24.0 ap376889
  • 24.0 ap376529
  • 24.0 ap375214
  • 24.0 ap377888
  • 24.0 ap377913
  • 24.0 ap376024
  • 24.0 ap378390
  • 24.0 ap375382
  • 24.0 ap379395
  • 24.0 ap377120
  • 24.0 ap378400
  • 24.0 ap376878
  • 24.0 ap377723
  • 24.0 ap374691
  • 24.0 ap379346
  • 24.0 ap378218
  • 24.0 ap376842
  • 24.0 ap374270
  • 24.0 ap376000
  • 24.0 ap376702
  • 24.0 ap377497
  • 24.0 ap375018
  • 24.0 ap378506
  • 24.0 ap377412
  • 24.0 ap375959
  • 24.0 ap379016
  • 24.0 ap379438
  • 24.0 ap378995
  • 24.0 ap378258
  • 24.0 ap378574
  • 24.0 ap375711
  • 24.0 ap376809
  • 24.0 ap375634
  • 24.0 ap375646
  • 24.0 ap375488
  • 24.0 ap377555
  • 24.0 ap375293
  • 24.0 ap378322
  • 24.0 ap378029
  • 24.0 ap379373
  • 24.0 ap377737
  • 24.0 ap378010
  • 24.0 ap378481
  • 24.0 ap376721
  • 24.0 ap375860
  • 24.0 ap378332
  • 24.0 ap379389
  • 24.0 ap377983
  • 24.0 ap378866
  • 24.0 ap377399
  • 24.0 ap376722
  • 24.0 ap379474
  • 24.0 ap378070
  • 24.0 ap376670
  • 24.0 ap375207
  • 24.0 ap376100
  • 24.0 ap378122
  • 24.0 ap376012
  • 24.0 ap375828
  • 24.0 ap378827
  • 24.0 ap376787
  • 24.0 ap376414
  • 24.0 ap377786
  • 24.0 ap376485
  • 24.0 ap379069
  • 24.0 ap378863
  • 24.0 ap376298
  • 24.0 ap373564
  • 24.0 ap376429
  • 24.0 ap379449
  • 24.0 ap377485
  • 24.0 ap378051
  • 24.0 ap375849
  • 24.0 ap376099
  • 24.0 ap378234
  • 24.0 ap377033
  • 24.0 ap377079
  • 24.0 ap375950
  • 24.0 ap375412
  • 24.0 ap375757
  • 24.0 ap376762
  • 24.0 ap376445
  • 24.0 ap379515
  • 24.0 ap375351
  • 24.0 ap375273
  • 24.0 ap378896
  • 24.0 ap379199
  • 24.0 ap374803
  • 24.0 ap375685
  • 24.0 ap375270
  • 24.0 ap370326
  • 24.0 ap375603
  • 24.0 ap376802
  • 24.0 ap376704
  • 24.0 ap379423
  • 24.0 ap376001
  • 24.0 ap377508
  • 24.0 ap375989
  • 24.0 ap376699
  • 24.0 ap377012
  • 24.0 ap379532
  • 24.0 ap378141
  • 24.0 ap375949
  • 24.0 ap375996
  • 24.0 ap378087
  • 24.0 ap378178
  • 24.0 ap375862
  • 24.0 ap376042
  • 24.0 ap378079
  • 24.0 ap379390
  • 24.0 ap378970
  • 24.0 ap375908
  • 24.0 ap378019
  • 24.0 ap377329
  • 24.0 ap376356
  • 24.0 ap377908
  • 24.0 ap377751
  • 24.0 ap377581
  • 24.0 ap375902
  • 24.0 ap356141
  • 24.0 ap358290
  • 24.0 ap362693
  • 24.0 ap370935
  • 24.0 ap372508
  • 24.0 ap372932
  • 24.0 ap375289
  • 24.0 ap375291
  • 24.0 ap375317
  • 24.0 ap375370
  • 24.0 ap375398
  • 24.0 ap375409
  • 24.0 ap375430
  • 24.0 ap375432
  • 24.0 ap375465
  • 24.0 ap375466
  • 24.0 ap375469
  • 24.0 ap375502
  • 24.0 ap375518
  • 24.0 ap375522
  • 24.0 ap375539
  • 24.0 ap375785
  • 24.0 ap375920
  • 24.0 ap376156
  • 24.0 ap376189
  • 24.0 ap376213
  • 24.0 ap376218
  • 24.0 ap376340
  • 24.0 ap376384
  • 24.0 ap376541
  • 24.0 ap376652
  • 24.0 ap376666
  • 24.0 ap376668
  • 24.0 ap376682
  • 24.0 ap376689
  • 24.0 ap376695
  • 24.0 ap376752
  • 24.0 ap376818
  • 24.0 ap376873
  • 24.0 ap377023
  • 24.0 ap377037
  • 24.0 ap377050
  • 24.0 ap377175
  • 24.0 ap377229
  • 24.0 ap377384
  • 24.0 ap377423
  • 24.0 ap377496
  • 24.0 ap377516
  • 24.0 ap377538
  • 24.0 ap377569
  • 24.0 ap377651
  • 24.0 ap377687
  • 24.0 ap377718
  • 24.0 ap377727
  • 24.0 ap377757
  • 24.0 ap377779
  • 24.0 ap377792
  • 24.0 ap377799
  • 24.0 ap378014
  • 24.0 ap378119
  • 24.0 ap378140
  • 24.0 ap378142
  • 24.0 ap378153
  • 24.0 ap378165
  • 24.0 ap378168
  • 24.0 ap378227
  • 24.0 ap378259
  • 24.0 ap378372
  • 24.0 ap378415
  • 24.0 ap378419
  • 24.0 ap378437
  • 24.0 ap378509
  • 24.0 ap378545
  • 24.0 ap378581
  • 24.0 ap378585
  • 24.0 ap378823
  • 24.0 ap378904
  • 24.0 ap378952
  • 24.0 ap378966
  • 24.0 ap378987
  • 24.0 ap379080
  • 24.0 ap379085
  • 24.0 ap379091
  • 24.0 ap379140
  • 24.0 ap379152
  • 24.0 ap379167
  • 24.0 ap379168
  • 24.0 ap379187
  • 24.0 ap379331
  • 24.0 ap379411
  • 24.0 ap379427
  • 24.0 ap379482
  • 24.0 ap379531
  • 24.0 ap379535
  • 24.0 ap379565
  • 24.0 ap379587
  • 24.0 ap379600
  • 24.0 ap379606
  • 24.0 ap379608
  • 24.0 ap379611
  • 24.0 ap379616
  • 24.0 ap379627
  • 24.0 ap379635
  • 24.0 ap379694
  • 24.0 ap379701
  • 24.0 ap379752
  • 24.0 ap379760
  • 24.0 ap379762
  • 24.0 ap379764
  • 24.0 ap379780
  • 24.0 ap379781
  • 24.0 ap379782
  • 24.0 ap379830
  • 24.0 ap379839
  • 24.0 ap379848
  • 24.0 ap379855
  • 24.0 ap379874
  • 24.0 ap379884
  • 24.0 ap379889
  • 24.0 ap379892
  • 24.0 ap379903
  • 24.0 ap378203
  • 24.0 ap379008
  • 24.0 ap379795
  • 24.0 ap379838
  • 24.0 ap379847
  • 24.0 ap379890
  • 24.0 ap379921
  • 24.0 ap379925
  • 24.0 ap379934
  • 24.0 ap379957
  • 24.0 ap379963
  • 24.0 ap379972
  • 24.0 ap380059
  • 24.0 ap380099
  • 24.0 ap380109
  • 24.0 ap380137
  • 24.0 ap380143
  • 24.0 ap380161
  • 24.0 ap380176
  • 24.0 ap380180
  • 24.0 ap380181
  • 24.0 ap380187
  • 24.0 ap380196
  • 24.0 ap380204
  • 24.0 ap380239
  • 24.0 ap380249
  • 24.0 ap380256
  • 24.0 ap380264
  • 24.0 ap380269
  • 24.0 ap380270
  • 24.0 ap380281
  • 24.0 ap380282
  • 24.0 ap380355
  • 24.0 ap380371
  • 24.0 ap380375
  • 24.0 ap380396
  • 24.0 ap380450
  • 24.0 ap380465
  • 24.0 ap380473
  • 24.0 ap380501
  • 24.0 ap380506
  • 24.0 ap380543
  • 24.0 ap380581
  • 24.0 ap380595
  • 24.0 ap380637
  • 24.0 ap380692
  • 24.0 ap380758
  • 24.0 ap380762
  • 24.0 ap380766
  • 24.0 ap381358
  • 24.0 ap382200
  • 24.0 ap381767
  • 24.0 ap382744
  • 24.0 ap381657
  • 24.0 ap381609
  • 24.0 ap382951
  • 24.0 ap381848
  • 24.0 ap380849
  • 24.0 ap381809
  • 24.0 ap381826
  • 24.0 ap381622
  • 24.0 ap381654
  • 24.0 ap374211
  • 24.0 ap381002
  • 24.0 ap382750
  • 24.0 ap382039
  • 24.0 ap381874
  • 24.0 ap383534
  • 24.0 ap381775
  • 24.0 ap382916
  • 24.0 ap380939
  • 24.0 ap383002
  • 24.0 ap382206
  • 24.0 ap381247
  • 24.0 ap381666
  • 24.0 ap381825
  • 24.0 ap381952
  • 24.0 ap382277
  • 24.0 ap380936
  • 24.0 ap380985
  • 24.0 ap382468
  • 24.0 ap382094
  • 24.0 ap381971
  • 24.0 ap383536
  • 24.0 ap381970
  • 24.0 ap381271
  • 24.0 ap381292
  • 24.0 ap381621
  • 24.0 ap379049
  • 24.0 ap380840
  • 24.0 ap381600
  • 24.0 ap382526
  • 24.0 ap382462
  • 24.0 ap380613
  • 24.0 ap381596
  • 24.0 ap380779
  • 24.0 ap382615
  • 24.0 ap382170
  • 24.0 ap382164
  • 24.0 ap382189
  • 24.0 ap381357
  • 24.0 ap381348
  • 24.0 ap382495
  • 24.0 ap382042
  • 24.0 ap382441
  • 24.0 ap381575
  • 24.0 ap381936
  • 24.0 ap382994
  • 24.0 ap381623
  • 24.0 ap382236
  • 24.0 ap382676
  • 24.0 ap382673
  • 24.0 ap380998
  • 24.0 ap382045
  • 24.0 ap382167
  • 24.0 ap381975
  • 24.0 ap382668
  • 24.0 ap382053
  • 24.0 ap383710
  • 24.0 ap382740
  • 24.0 ap383459
  • 24.0 ap382692
  • 24.0 ap383737
  • 24.0 ap380045
  • 24.0 ap382195
  • 24.0 ap382057
  • 24.0 ap381243
  • 24.0 ap382160
  • 24.0 ap382445
  • 24.0 ap382246
  • 24.0 ap382958
  • 24.0 ap381854
  • 24.0 ap381604
  • 24.0 ap381091
  • 24.0 ap381079
  • 24.0 ap381527
  • 24.0 ap383772
  • 24.0 ap381004
  • 24.0 ap380737
  • 24.0 ap382253
  • 24.0 ap381721
  • 24.0 ap381322
  • 24.0 ap382098
  • 24.0 ap382677
  • 24.0 ap382169
  • 24.0 ap383696
  • 24.0 ap382258
  • 24.0 ap380751
  • 24.0 ap382262
  • 24.0 ap382267
  • 24.0 ap382192
  • 24.0 ap380128
  • 24.0 ap382656
  • 24.0 ap383779
  • 24.0 ap382194
  • 24.0 ap382691
  • 24.0 ap382372
  • 24.0 ap380771
  • 24.0 ap382155
  • 24.0 ap382484
  • 24.0 ap383902
  • 24.0 ap382362
  • 24.0 ap383788
  • 24.0 ap383771
  • 24.0 ap382836
  • 24.0 ap382240
  • 24.0 ap383700
  • 24.0 ap383597
  • 24.0 ap381108
  • 24.0 ap379012
  • 24.0 ap382709
  • 24.0 ap381078
  • 24.0 ap383505
  • 24.0 ap382977
  • 24.0 ap382912
  • 24.0 ap383569
  • 24.0 ap383105
  • 24.0 ap380537
  • 24.0 ap382935
  • 24.0 ap381616
  • 24.0 ap383519
  • 24.0 ap381410
  • 24.0 ap383573
  • 24.0 ap382959
  • 24.0 ap376010
  • 24.0 ap380051
  • 24.0 ap381506
  • 24.0 ap381732
  • 24.0 ap383492
  • 24.0 ap383089
  • 24.0 ap383172
  • 24.0 ap381624
  • 24.0 ap383547
  • 24.0 ap381584
  • 24.0 ap382945
  • 24.0 ap382594
  • 24.0 ap383494
  • 24.0 ap381611
  • 24.0 ap380739
  • 24.0 ap381574
  • 24.0 ap383390
  • 24.0 ap383538
  • 24.0 ap382838
  • 24.0 ap382252
  • 24.0 ap383518
  • 24.0 ap383326
  • 24.0 ap383463
  • 24.0 ap383391
  • 24.0 ap380052
  • 24.0 ap383352
  • 24.0 ap383064
  • 24.0 ap382488
  • 24.0 ap381615
  • 24.0 ap382952
  • 24.0 ap381055
  • 24.0 ap383466
  • 24.0 ap383178
  • 24.0 ap383515
  • 24.0 ap383681
  • 24.0 ap383377
  • 24.0 ap383327
  • 24.0 ap383123
  • 24.0 ap383346
  • 24.0 ap383331
  • 24.0 ap382993
  • 24.0 ap383147
  • 24.0 ap382487
  • 24.0 ap383170
  • 24.0 ap382929
  • 24.0 ap383717
  • 24.0 ap380782
  • 24.0 ap382954
  • 24.0 ap382527
  • 24.0 ap383754
  • 24.0 ap382969
  • 24.0 ap382965
  • 24.0 ap380970
  • 24.0 ap382515
  • 24.0 ap382463
  • 24.0 ap382976
  • 24.0 ap380837
  • 24.0 ap381878
  • 24.0 ap381031
  • 24.0 ap383338
  • 24.0 ap383119
  • 24.0 ap380802
  • 24.0 ap383168
  • 24.0 ap383297
  • 24.0 ap383188
  • 24.0 ap381285
  • 24.0 ap381257
  • 24.0 ap383247
  • 24.0 ap382186
  • 24.0 ap381418
  • 24.0 ap381515
  • 24.0 ap381570
  • 24.0 ap383511
  • 24.0 ap381367
  • 24.0 ap378603
  • 24.0 ap381366
  • 24.0 ap382456
  • 24.0 ap381412
  • 24.0 ap383567
  • 24.0 ap381548
  • 24.0 ap379397
  • 24.0 ap381518
  • 24.0 ap381341
  • 24.0 ap381498
  • 24.0 ap381507
  • 24.0 ap381339
  • 24.0 ap383302
  • 24.0 ap381398
  • 24.0 ap380775
  • 24.0 ap381526
  • 24.0 ap383908
  • 24.0 ap383821
  • 24.0 ap383781
  • 24.0 ap381334
  • 24.0 ap382689
  • 24.0 ap381215
  • 24.0 ap382646
  • 24.0 ap382493
  • 24.0 ap382300
  • 24.0 ap381001
  • 24.0 ap380697
  • 24.0 ap382412
  • 24.0 ap381305
  • 24.0 ap381523
  • 24.0 ap380535
  • 24.0 ap381543
  • 24.0 ap381088
  • 24.0 ap382631
  • 24.0 ap379046
  • 24.0 ap380167
  • 24.0 ap381308
  • 24.0 ap381340
  • 24.0 ap380783
  • 24.0 ap383603
  • 24.0 ap381300
  • 24.0 ap381805
  • 24.0 ap381733
  • 24.0 ap381384
  • 24.0 ap373571
  • 24.0 ap380042
  • 24.0 ap381840
  • 24.0 ap381951
  • 24.0 ap382856
  • 24.0 ap383524
  • 24.0 ap380047
  • 24.0 ap381857
  • 24.0 ap383520
  • 24.0 ap381956
  • 24.0 ap381655
  • 24.0 ap381569
  • 24.0 ap379954
  • 24.0 ap383716
  • 24.0 ap383775
  • 24.0 ap383838
  • 24.0 ap383905
  • 24.0 ap383909
  • 24.0 ap383933
  • 24.0 ap383943
  • 24.0 ap383952
  • 24.0 ap383955
  • 24.0 ap383968
  • 24.0 ap383979
  • 24.0 ap384000
  • 24.0 ap384115
  • 24.0 ap383989
  • 24.0 ap384002
  • 24.0 ap383782
  • 24.0 ap383992
  • 24.0 ap383973
  • 24.0 ap383309
  • 24.0 ap383514
  • 24.0 ap383815
  • 24.0 ap383899
  • 24.0 ap383983
  • 24.0 ap383994
  • 24.0 ap383998
  • 24.0 ap384015
  • 24.0 ap384023
  • 24.0 ap384034
  • 24.0 ap384120
  • 24.0 ap384127
  • 24.0 ap384129
  • 24.0 ap384134
  • 24.0 ap384137
  • 24.0 ap384138
  • 24.0 ap384145
  • 24.0 ap384151
  • 24.0 ap384163
  • 24.0 ap384173
  • 24.0 ap384177
  • 24.0 ap384179
  • 24.0 ap384185
  • 24.0 ap384191
  • 24.0 ap384194
  • 24.0 ap384209
  • 24.0 ap384211
  • 24.0 ap384220
  • 24.0 ap384234
  • 24.0 ap384309
  • 24.0 ap384317
  • 24.0 ap381051
  • 24.0 ap381081
  • 24.0 ap382225
  • 24.0 ap382717
  • 24.0 ap382824
  • 24.0 ap382841
  • 24.0 ap382857
  • 24.0 ap382873
  • 24.0 ap382894
  • 24.0 ap384232
  • 24.0 ap384239
  • 24.0 ap384320
  • 24.0 ap384339
  • 24.0 ap384342
  • 24.0 ap384344
  • 24.0 ap384345
  • 24.0 ap384351
  • 24.0 ap384357
  • 24.0 ap384358
  • 24.0 ap384361
  • 24.0 ap384365
  • 24.0 ap384367
  • 24.0 ap384372
  • 24.0 ap384374
  • 24.0 ap384377
  • 24.0 ap384386
  • 24.0 ap384389
  • 24.0 ap384395
  • 24.0 ap384423
  • 24.0 ap384428
  • 24.0 ap384429
  • 24.0 ap384430
  • 24.0 ap384431
  • 24.0 ap384434
  • 24.0 ap384439
  • 24.0 ap384441
  • 24.0 ap384446
  • 24.0 ap384448
  • 24.0 ap384449
  • 24.0 ap384455
  • 24.0 ap384462
  • 24.0 ap384468
  • 24.0 ap384471
  • 24.0 ap384474
  • 24.0 ap384480
  • 24.0 ap384543
  • 24.0 ap384589
  • 24.0 ap384594
  • 24.0 ap384620
  • 24.0 ap384622
  • 24.0 ap384627
  • 24.0 ap384629
  • 24.0 ap384636
  • 24.0 ap384641
  • 24.0 ap384643
  • 24.0 ap384650
  • 23.0
  • 23.0 ap380204
  • 23.0 ap380281
  • 23.0 ap380355
  • 23.0 ap380375
  • 23.0 ap380391
  • 23.0 ap380396
  • 23.0 ap366748
  • 23.0 ap374310
  • 23.0 ap375293
  • 23.0 ap371233
  • 23.0 ap381051
  • 23.0 ap365558
  • 23.0 ap379795
  • 23.0 ap373098
  • 23.0 ap382864
  • 23.0 ap364705
  • 23.0 ap375539
  • 23.0 ap382358
  • 23.0 ap374143
  • 23.0 ap367292
  • 23.0 ap375289
  • 23.0 ap375624
  • 23.0 ap375317
  • 23.0 ap362261
  • 23.0 ap382281
  • 23.0 ap367434
  • 23.0 ap363641
  • 23.0 ap376661
  • 23.0 ap382262
  • 23.0 ap380691
  • 23.0 ap383569
  • 23.0 ap368179
  • 23.0 ap375601
  • 23.0 ap382206
  • 23.0 ap383829
  • 23.0 ap377319
  • 23.0 ap381081
  • 23.0 ap363869
  • 23.0 ap367895
  • 23.0 ap383902
  • 23.0 ap372017
  • 23.0 ap383519
  • 23.0 ap375345
  • 23.0 ap374085
  • 23.0 ap367488
  • 23.0 ap382236
  • 23.0 ap363192
  • 23.0 ap371974
  • 23.0 ap367223
  • 23.0 ap373017
  • 23.0 ap373752
  • 23.0 ap373882
  • 23.0 ap373861
  • 23.0 ap365531
  • 23.0 ap373870
  • 23.0 ap372929
  • 23.0 ap373952
  • 23.0 ap374037
  • 23.0 ap368214
  • 23.0 ap366264
  • 23.0 ap373769
  • 23.0 ap383779
  • 23.0 ap374583
  • 23.0 ap373009
  • 23.0 ap371300
  • 23.0 ap374125
  • 23.0 ap367985
  • 23.0 ap364367
  • 23.0 ap362578
  • 23.0 ap373871
  • 23.0 ap383785
  • 23.0 ap380766
  • 23.0 ap365598
  • 23.0 ap380849
  • 23.0 ap373912
  • 23.0 ap366334
  • 23.0 ap374421
  • 23.0 ap380692
  • 23.0 ap380758
  • 23.0 ap374305
  • 23.0 ap380771
  • 23.0 ap367992
  • 23.0 ap374055
  • 23.0 ap367547
  • 23.0 ap368000
  • 23.0 ap366366
  • 23.0 ap365227
  • 23.0 ap372015
  • 23.0 ap372012
  • 23.0 ap374668
  • 23.0 ap383788
  • 23.0 ap351263
  • 23.0 ap374715
  • 23.0 ap374691
  • 23.0 ap370792
  • 23.0 ap364467
  • 23.0 ap365701
  • 23.0 ap374255
  • 23.0 ap381357
  • 23.0 ap374311
  • 23.0 ap374162
  • 23.0 ap363644
  • 23.0 ap373754
  • 23.0 ap373301
  • 23.0 ap373182
  • 23.0 ap374226
  • 23.0 ap377423
  • 23.0 ap369489
  • 23.0 ap373294
  • 23.0 ap383524
  • 23.0 ap383302
  • 23.0 ap375902
  • 23.0 ap376010
  • 23.0 ap382487
  • 23.0 ap371314
  • 23.0 ap371327
  • 23.0 ap371285
  • 23.0 ap371368
  • 23.0 ap371167
  • 23.0 ap374454
  • 23.0 ap383538
  • 23.0 ap374109
  • 23.0 ap374639
  • 23.0 ap371099
  • 23.0 ap369731
  • 23.0 ap371310
  • 23.0 ap383490
  • 23.0 ap374315
  • 23.0 ap374249
  • 23.0 ap374493
  • 23.0 ap374165
  • 23.0 ap374361
  • 23.0 ap373330
  • 23.0 ap369928
  • 23.0 ap374296
  • 23.0 ap371319
  • 23.0 ap374210
  • 23.0 ap372116
  • 23.0 ap371748
  • 23.0 ap374472
  • 23.0 ap372453
  • 23.0 ap371432
  • 23.0 ap372345
  • 23.0 ap371868
  • 23.0 ap372121
  • 23.0 ap383710
  • 23.0 ap372995
  • 23.0 ap373511
  • 23.0 ap372873
  • 23.0 ap370427
  • 23.0 ap371209
  • 23.0 ap355298
  • 23.0 ap371811
  • 23.0 ap373589
  • 23.0 ap366525
  • 23.0 ap381596
  • 23.0 ap383567
  • 23.0 ap372533
  • 23.0 ap372922
  • 23.0 ap370538
  • 23.0 ap371268
  • 23.0 ap383681
  • 23.0 ap374498
  • 23.0 ap373004
  • 23.0 ap371269
  • 23.0 ap371456
  • 23.0 ap366201
  • 23.0 ap360464
  • 23.0 ap362035
  • 23.0 ap375383
  • 23.0 ap375770
  • 23.0 ap372607
  • 23.0 ap371259
  • 23.0 ap374794
  • 23.0 ap366296
  • 23.0 ap374892
  • 23.0 ap367007
  • 23.0 ap365754
  • 23.0 ap374785
  • 23.0 ap352402
  • 23.0 ap372079
  • 23.0 ap375309
  • 23.0 ap366797
  • 23.0 ap366335
  • 23.0 ap375465
  • 23.0 ap374609
  • 23.0 ap381366
  • 23.0 ap370383
  • 23.0 ap371722
  • 23.0 ap362749
  • 23.0 ap367323
  • 23.0 ap374820
  • 23.0 ap369763
  • 23.0 ap381657
  • 23.0 ap368517
  • 23.0 ap372455
  • 23.0 ap365058
  • 23.0 ap370362
  • 23.0 ap381358
  • 23.0 ap374723
  • 23.0 ap375353
  • 23.0 ap375370
  • 23.0 ap380201
  • 23.0 ap380041
  • 23.0 ap361414
  • 23.0 ap380507
  • 23.0 ap368643
  • 23.0 ap379140
  • 23.0 ap379461
  • 23.0 ap379501
  • 23.0 ap377147
  • 23.0 ap376261
  • 23.0 ap379417
  • 23.0 ap372207
  • 23.0 ap368743
  • 23.0 ap370464
  • 23.0 ap353137
  • 23.0 ap373016
  • 23.0 ap364518
  • 23.0 ap361651
  • 23.0 ap379339
  • 23.0 ap374711
  • 23.0 ap371091
  • 23.0 ap370763
  • 23.0 ap366610
  • 23.0 ap371021
  • 23.0 ap366275
  • 23.0 ap370909
  • 23.0 ap381243
  • 23.0 ap381271
  • 23.0 ap379449
  • 23.0 ap371052
  • 23.0 ap381247
  • 23.0 ap383603
  • 23.0 ap380249
  • 23.0 ap382195
  • 23.0 ap380130
  • 23.0 ap373571
  • 23.0 ap382668
  • 23.0 ap382493
  • 23.0 ap380269
  • 23.0 ap380232
  • 23.0 ap364371
  • 23.0 ap377483
  • 23.0 ap383716
  • 23.0 ap383775
  • 23.0 ap383909
  • 23.0 ap383913
  • 23.0 ap383943
  • 23.0 ap383952
  • 23.0 ap383955
  • 23.0 ap383979
  • 23.0 ap383838
  • 23.0 ap384023
  • 23.0 ap381781
  • 23.0 ap383717
  • 23.0 ap383797
  • 23.0 ap383815
  • 23.0 ap383998
  • 23.0 ap384015
  • 23.0 ap384127
  • 23.0 ap384131
  • 23.0 ap384151
  • 23.0 ap384173
  • 23.0 ap384179
  • 23.0 ap384185
  • 23.0 ap384211
  • 23.0 ap384220
  • 23.0 ap384227
  • 23.0 ap384245
  • 23.0 ap384344
  • 23.0 ap363366
  • 23.0 ap364258
  • 23.0 ap364844
  • 23.0 ap365170
  • 23.0 ap365576
  • 23.0 ap365858
  • 23.0 ap366221
  • 23.0 ap366294
  • 23.0 ap365801
  • 23.0 ap366170
  • 23.0 ap364925
  • 23.0 ap366295
  • 23.0 ap366346
  • 23.0 ap366348
  • 23.0 ap365171
  • 23.0 ap364295
  • 23.0 ap364559
  • 23.0 ap366118
  • 23.0 ap366252
  • 23.0 ap363815
  • 23.0 ap363729
  • 23.0 ap365390
  • 23.0 ap364932
  • 23.0 ap365239
  • 23.0 ap365759
  • 23.0 ap366211
  • 23.0 ap366290
  • 23.0 ap365223
  • 23.0 ap366117
  • 23.0 ap365730
  • 23.0 ap366299
  • 23.0 ap366261
  • 23.0 ap365889
  • 23.0 ap366181
  • 23.0 ap365115
  • 23.0 ap364048
  • 23.0 ap366298
  • 23.0 ap364699
  • 23.0 ap345032
  • 23.0 ap362683
  • 23.0 ap363361
  • 23.0 ap352969
  • 23.0 ap359103
  • 23.0 ap366375
  • 23.0 ap366870
  • 23.0 ap366912
  • 23.0 ap366624
  • 23.0 ap367109
  • 23.0 ap366397
  • 23.0 ap354354
  • 23.0 ap349850
  • 23.0 ap366880
  • 23.0 ap360007
  • 23.0 ap366744
  • 23.0 ap366747
  • 23.0 ap366656
  • 23.0 ap367206
  • 23.0 ap362771
  • 23.0 ap367291
  • 23.0 ap366916
  • 23.0 ap367207
  • 23.0 ap363363
  • 23.0 ap366959
  • 23.0 ap351530
  • 23.0 ap361116
  • 23.0 ap366898
  • 23.0 ap357608
  • 23.0 ap361533
  • 23.0 ap366827
  • 23.0 ap352962
  • 23.0 ap366412
  • 23.0 ap369295
  • 23.0 ap366358
  • 23.0 ap366677
  • 23.0 ap366882
  • 23.0 ap366972
  • 23.0 ap366486
  • 23.0 ap366803
  • 23.0 ap358290
  • 23.0 ap363265
  • 23.0 ap363128
  • 23.0 ap366701
  • 23.0 ap366373
  • 23.0 ap369674
  • 23.0 ap369206
  • 23.0 ap369065
  • 23.0 ap368327
  • 23.0 ap368308
  • 23.0 ap368632
  • 23.0 ap367290
  • 23.0 ap369302
  • 23.0 ap368419
  • 23.0 ap369501
  • 23.0 ap369219
  • 23.0 ap368601
  • 23.0 ap368604
  • 23.0 ap368706
  • 23.0 ap368461
  • 23.0 ap368612
  • 23.0 ap368552
  • 23.0 ap369529
  • 23.0 ap369748
  • 23.0 ap368218
  • 23.0 ap368913
  • 23.0 ap369607
  • 23.0 ap369693
  • 23.0 ap368957
  • 23.0 ap368510
  • 23.0 ap368445
  • 23.0 ap369106
  • 23.0 ap369257
  • 23.0 ap368987
  • 23.0 ap369150
  • 23.0 ap368695
  • 23.0 ap368167
  • 23.0 ap370361
  • 23.0 ap367969
  • 23.0 ap367367
  • 23.0 ap369434
  • 23.0 ap369132
  • 23.0 ap367678
  • 23.0 ap367517
  • 23.0 ap369863
  • 23.0 ap369227
  • 23.0 ap368970
  • 23.0 ap369454
  • 23.0 ap367332
  • 23.0 ap368067
  • 23.0 ap369641
  • 23.0 ap367794
  • 23.0 ap369934
  • 23.0 ap370196
  • 23.0 ap367358
  • 23.0 ap367453
  • 23.0 ap369881
  • 23.0 ap367732
  • 23.0 ap367294
  • 23.0 ap367646
  • 23.0 ap367874
  • 23.0 ap370344
  • 23.0 ap367524
  • 23.0 ap368153
  • 23.0 ap368087
  • 23.0 ap367820
  • 23.0 ap368180
  • 23.0 ap367726
  • 23.0 ap370103
  • 23.0 ap367974
  • 23.0 ap367396
  • 23.0 ap367340
  • 23.0 ap367293
  • 23.0 ap369855
  • 23.0 ap368140
  • 23.0 ap367298
  • 23.0 ap367998
  • 23.0 ap372337
  • 23.0 ap372706
  • 23.0 ap368032
  • 23.0 ap367906
  • 23.0 ap370138
  • 23.0 ap372380
  • 23.0 ap372246
  • 23.0 ap370193
  • 23.0 ap372643
  • 23.0 ap372560
  • 23.0 ap367513
  • 23.0 ap369931
  • 23.0 ap368195
  • 23.0 ap372243
  • 23.0 ap368216
  • 23.0 ap369929
  • 23.0 ap367365
  • 23.0 ap367782
  • 23.0 ap367675
  • 23.0 ap372757
  • 23.0 ap372389
  • 23.0 ap372799
  • 23.0 ap372641
  • 23.0 ap371050
  • 23.0 ap372338
  • 23.0 ap372623
  • 23.0 ap372422
  • 23.0 ap372033
  • 23.0 ap372178
  • 23.0 ap371516
  • 23.0 ap372351
  • 23.0 ap372708
  • 23.0 ap372100
  • 23.0 ap372504
  • 23.0 ap371961
  • 23.0 ap370590
  • 23.0 ap370544
  • 23.0 ap372599
  • 23.0 ap371610
  • 23.0 ap371836
  • 23.0 ap371343
  • 23.0 ap372674
  • 23.0 ap371202
  • 23.0 ap370911
  • 23.0 ap370817
  • 23.0 ap372043
  • 23.0 ap370802
  • 23.0 ap371725
  • 23.0 ap370437
  • 23.0 ap370926
  • 23.0 ap370884
  • 23.0 ap371681
  • 23.0 ap371366
  • 23.0 ap370952
  • 23.0 ap371281
  • 23.0 ap371436
  • 23.0 ap371153
  • 23.0 ap371033
  • 23.0 ap371977
  • 23.0 ap371627
  • 23.0 ap371155
  • 23.0 ap371134
  • 23.0 ap371295
  • 23.0 ap372152
  • 23.0 ap371760
  • 23.0 ap370627
  • 23.0 ap371583
  • 23.0 ap371546
  • 23.0 ap371770
  • 23.0 ap371437
  • 23.0 ap372091
  • 23.0 ap372163
  • 23.0 ap370737
  • 23.0 ap370908
  • 23.0 ap370465
  • 23.0 ap371587
  • 23.0 ap375133
  • 23.0 ap371682
  • 23.0 ap375266
  • 23.0 ap372099
  • 23.0 ap375254
  • 23.0 ap372016
  • 23.0 ap372177
  • 23.0 ap375242
  • 23.0 ap375206
  • 23.0 ap375291
  • 23.0 ap371775
  • 23.0 ap375196
  • 23.0 ap375688
  • 23.0 ap375382
  • 23.0 ap375634
  • 23.0 ap375654
  • 23.0 ap375449
  • 23.0 ap375321
  • 23.0 ap375685
  • 23.0 ap375509
  • 23.0 ap375719
  • 23.0 ap375720
  • 23.0 ap375464
  • 23.0 ap375625
  • 23.0 ap375441
  • 23.0 ap375709
  • 23.0 ap375343
  • 23.0 ap375533
  • 23.0 ap375672
  • 23.0 ap375545
  • 23.0 ap375264
  • 23.0 ap375661
  • 23.0 ap375646
  • 23.0 ap375238
  • 23.0 ap375304
  • 23.0 ap375097
  • 23.0 ap373664
  • 23.0 ap373562
  • 23.0 ap372932
  • 23.0 ap374339
  • 23.0 ap374265
  • 23.0 ap374230
  • 23.0 ap374430
  • 23.0 ap373102
  • 23.0 ap375655
  • 23.0 ap373777
  • 23.0 ap374113
  • 23.0 ap373015
  • 23.0 ap374971
  • 23.0 ap374803
  • 23.0 ap374677
  • 23.0 ap372974
  • 23.0 ap373117
  • 23.0 ap374312
  • 23.0 ap374354
  • 23.0 ap375018
  • 23.0 ap373018
  • 23.0 ap374506
  • 23.0 ap374588
  • 23.0 ap373950
  • 23.0 ap375038
  • 23.0 ap373480
  • 23.0 ap374238
  • 23.0 ap372845
  • 23.0 ap373564
  • 23.0 ap373482
  • 23.0 ap372994
  • 23.0 ap373137
  • 23.0 ap373108
  • 23.0 ap374977
  • 23.0 ap373034
  • 23.0 ap374324
  • 23.0 ap374031
  • 23.0 ap374093
  • 23.0 ap373732
  • 23.0 ap374507
  • 23.0 ap373684
  • 23.0 ap374356
  • 23.0 ap373820
  • 23.0 ap373104
  • 23.0 ap373954
  • 23.0 ap373644
  • 23.0 ap373899
  • 23.0 ap374822
  • 23.0 ap374254
  • 23.0 ap375069
  • 23.0 ap373918
  • 23.0 ap374557
  • 23.0 ap372854
  • 23.0 ap373647
  • 23.0 ap374838
  • 23.0 ap374330
  • 23.0 ap374799
  • 23.0 ap374428
  • 23.0 ap373008
  • 23.0 ap375936
  • 23.0 ap375862
  • 23.0 ap374994
  • 23.0 ap376041
  • 23.0 ap374895
  • 23.0 ap375793
  • 23.0 ap376088
  • 23.0 ap373046
  • 23.0 ap375937
  • 23.0 ap374680
  • 23.0 ap376181
  • 23.0 ap375797
  • 23.0 ap375003
  • 23.0 ap373763
  • 23.0 ap373539
  • 23.0 ap373111
  • 23.0 ap375734
  • 23.0 ap376117
  • 23.0 ap375743
  • 23.0 ap376087
  • 23.0 ap376179
  • 23.0 ap376100
  • 23.0 ap373299
  • 23.0 ap373303
  • 23.0 ap375908
  • 23.0 ap376356
  • 23.0 ap375984
  • 23.0 ap373318
  • 23.0 ap375865
  • 23.0 ap373196
  • 23.0 ap376038
  • 23.0 ap373257
  • 23.0 ap373285
  • 23.0 ap376218
  • 23.0 ap373438
  • 23.0 ap373212
  • 23.0 ap373391
  • 23.0 ap373315
  • 23.0 ap373271
  • 23.0 ap376509
  • 23.0 ap376252
  • 23.0 ap376602
  • 23.0 ap376752
  • 23.0 ap373452
  • 23.0 ap376429
  • 23.0 ap376860
  • 23.0 ap376710
  • 23.0 ap376410
  • 23.0 ap376577
  • 23.0 ap376633
  • 23.0 ap376298
  • 23.0 ap373189
  • 23.0 ap376426
  • 23.0 ap376873
  • 23.0 ap376668
  • 23.0 ap376407
  • 23.0 ap376670
  • 23.0 ap376485
  • 23.0 ap376642
  • 23.0 ap376652
  • 23.0 ap376523
  • 23.0 ap376656
  • 23.0 ap376620
  • 23.0 ap376531
  • 23.0 ap378025
  • 23.0 ap377412
  • 23.0 ap376504
  • 23.0 ap376762
  • 23.0 ap376541
  • 23.0 ap376671
  • 23.0 ap376844
  • 23.0 ap376701
  • 23.0 ap376614
  • 23.0 ap377578
  • 23.0 ap377496
  • 23.0 ap377715
  • 23.0 ap377508
  • 23.0 ap376416
  • 23.0 ap377409
  • 23.0 ap377778
  • 23.0 ap376355
  • 23.0 ap377866
  • 23.0 ap377516
  • 23.0 ap377644
  • 23.0 ap377755
  • 23.0 ap377540
  • 23.0 ap377497
  • 23.0 ap377523
  • 23.0 ap377581
  • 23.0 ap377727
  • 23.0 ap378436
  • 23.0 ap377515
  • 23.0 ap377674
  • 23.0 ap378400
  • 23.0 ap377566
  • 23.0 ap377494
  • 23.0 ap377799
  • 23.0 ap377779
  • 23.0 ap378165
  • 23.0 ap378332
  • 23.0 ap377757
  • 23.0 ap377908
  • 23.0 ap377802
  • 23.0 ap377999
  • 23.0 ap377984
  • 23.0 ap378134
  • 23.0 ap378545
  • 23.0 ap378863
  • 23.0 ap378882
  • 23.0 ap379016
  • 23.0 ap378599
  • 23.0 ap378218
  • 23.0 ap378164
  • 23.0 ap379085
  • 23.0 ap378880
  • 23.0 ap378334
  • 23.0 ap378862
  • 23.0 ap378425
  • 23.0 ap378259
  • 23.0 ap378970
  • 23.0 ap378153
  • 23.0 ap378585
  • 23.0 ap378509
  • 23.0 ap378393
  • 23.0 ap378079
  • 23.0 ap378404
  • 23.0 ap378471
  • 23.0 ap378966
  • 23.0 ap379049
  • 23.0 ap379012
  • 23.0 ap379080
  • 23.0 ap378865
  • 23.0 ap378140
  • 23.0 ap378574
  • 23.0 ap378440
  • 23.0 ap378055
  • 23.0 ap378823
  • 23.0 ap378603
  • 23.0 ap379397
  • 23.0 ap379153
  • 23.0 ap378953
  • 23.0 ap378866
  • 23.0 ap379008
  • 23.0 ap378924
  • 23.0 ap378581
  • 23.0 ap378999
  • 23.0 ap378161
  • 23.0 ap378080
  • 23.0 ap379493
  • 23.0 ap380161
  • 23.0 ap379046
  • 23.0 ap379874
  • 23.0 ap378391
  • 23.0 ap380239
  • 23.0 ap379951
  • 23.0 ap379772
  • 23.0 ap378419
  • 23.0 ap378257
  • 23.0 ap379775
  • 23.0 ap379838
  • 23.0 ap379531
  • 23.0 ap379888
  • 23.0 ap379167
  • 23.0 ap378485
  • 23.0 ap380167
  • 23.0 ap380099
  • 23.0 ap379847
  • 23.0 ap379098
  • 23.0 ap379972
  • 23.0 ap379438
  • 23.0 ap380143
  • 23.0 ap380187
  • 23.0 ap379326
  • 23.0 ap379427
  • 23.0 ap380045
  • 23.0 ap379848
  • 23.0 ap377384
  • 23.0 ap376984
  • 23.0 ap377042
  • 23.0 ap379890
  • 23.0 ap380128
  • 23.0 ap377149
  • 23.0 ap380446
  • 23.0 ap379694
  • 23.0 ap376988
  • 23.0 ap380270
  • 23.0 ap379780
  • 23.0 ap380371
  • 23.0 ap377225
  • 23.0 ap379752
  • 23.0 ap380137
  • 23.0 ap377045
  • 23.0 ap376989
  • 23.0 ap380180
  • 23.0 ap380042
  • 23.0 ap376935
  • 23.0 ap379487
  • 23.0 ap379934
  • 23.0 ap377023
  • 23.0 ap377327
  • 23.0 ap379833
  • 23.0 ap376953
  • 23.0 ap380473
  • 23.0 ap380535
  • 23.0 ap377068
  • 23.0 ap379853
  • 23.0 ap379350
  • 23.0 ap380998
  • 23.0 ap380626
  • 23.0 ap377079
  • 23.0 ap379151
  • 23.0 ap377329
  • 23.0 ap381091
  • 23.0 ap380751
  • 23.0 ap380543
  • 23.0 ap381270
  • 23.0 ap380817
  • 23.0 ap381055
  • 23.0 ap380506
  • 23.0 ap381275
  • 23.0 ap380739
  • 23.0 ap380783
  • 23.0 ap380970
  • 23.0 ap380537
  • 23.0 ap381140
  • 23.0 ap380697
  • 23.0 ap380936
  • 23.0 ap380486
  • 23.0 ap380512
  • 23.0 ap380737
  • 23.0 ap381118
  • 23.0 ap380555
  • 23.0 ap381072
  • 23.0 ap381584
  • 23.0 ap381088
  • 23.0 ap381137
  • 23.0 ap382053
  • 23.0 ap381523
  • 23.0 ap381732
  • 23.0 ap382372
  • 23.0 ap382252
  • 23.0 ap383002
  • 23.0 ap382857
  • 23.0 ap383512
  • 23.0 ap382846
  • 23.0 ap382253
  • 23.0 ap381322
  • 23.0 ap382057
  • 23.0 ap382386
  • 23.0 ap382709
  • 23.0 ap382954
  • 23.0 ap382505
  • 23.0 ap382225
  • 23.0 ap382717
  • 23.0 ap381840
  • 23.0 ap381594
  • 23.0 ap381410
  • 23.0 ap382463
  • 23.0 ap382198
  • 23.0 ap381526
  • 23.0 ap381498
  • 23.0 ap381418
  • 23.0 ap383573
  • 23.0 ap382838
  • 23.0 ap381609
  • 23.0 ap381548
  • 23.0 ap382409
  • 23.0 ap383706
  • 23.0 ap382945
  • 23.0 ap382300
  • 23.0 ap382615
  • 23.0 ap382977
  • 23.0 ap384345
  • 23.0 ap383547
  • 23.0 ap382158
  • 23.0 ap382240
  • 23.0 ap383515
  • 23.0 ap383754
  • 23.0 ap381961
  • 23.0 ap382526
  • 23.0 ap382951
  • 23.0 ap382824
  • 23.0 ap382993
  • 23.0 ap383536
  • 23.0 ap383247
  • 23.0 ap381504
  • 23.0 ap383170
  • 23.0 ap382032
  • 23.0 ap382992
  • 23.0 ap383594
  • 23.0 ap383365
  • 23.0 ap383772
  • 23.0 ap381569
  • 23.0 ap381348
  • 23.0 ap382192
  • 23.0 ap381367
  • 23.0 ap383352
  • 23.0 ap383597
  • 23.0 ap381622
  • 23.0 ap383518
  • 23.0 ap383492
  • 23.0 ap383309
  • 23.0 ap383064
  • 23.0 ap383168
  • 23.0 ap382362
  • 23.0 ap382251
  • 23.0 ap383319
  • 23.0 ap382434
  • 23.0 ap384431
  • 23.0 ap383514
  • 23.0 ap384441
  • 23.0 ap383994
  • 23.0 ap384034
  • 23.0 ap384120
  • 23.0 ap384134
  • 23.0 ap384191
  • 23.0 ap384234
  • 23.0 ap384309
  • 23.0 ap384317
  • 23.0 ap342846
  • 23.0 ap352264
  • 23.0 ap352954
  • 23.0 ap355907
  • 23.0 ap356141
  • 23.0 ap356752
  • 23.0 ap358046
  • 23.0 ap359922
  • 23.0 ap361443
  • 23.0 ap361930
  • 23.0 ap362693
  • 23.0 ap363247
  • 23.0 ap363431
  • 23.0 ap363672
  • 23.0 ap363710
  • 23.0 ap364519
  • 23.0 ap364532
  • 23.0 ap364634
  • 23.0 ap364753
  • 23.0 ap364956
  • 23.0 ap365040
  • 23.0 ap365155
  • 23.0 ap365646
  • 23.0 ap365661
  • 23.0 ap365689
  • 23.0 ap365744
  • 23.0 ap365770
  • 23.0 ap365773
  • 23.0 ap365798
  • 23.0 ap365886
  • 23.0 ap365900
  • 23.0 ap365946
  • 23.0 ap365979
  • 23.0 ap365983
  • 23.0 ap365984
  • 23.0 ap366120
  • 23.0 ap366247
  • 23.0 ap366395
  • 23.0 ap366398
  • 23.0 ap366411
  • 23.0 ap366443
  • 23.0 ap366661
  • 23.0 ap366684
  • 23.0 ap366835
  • 23.0 ap366836
  • 23.0 ap366842
  • 23.0 ap366879
  • 23.0 ap366905
  • 23.0 ap366940
  • 23.0 ap366967
  • 23.0 ap366968
  • 23.0 ap366982
  • 23.0 ap366984
  • 23.0 ap366986
  • 23.0 ap367006
  • 23.0 ap367014
  • 23.0 ap367112
  • 23.0 ap367113
  • 23.0 ap367129
  • 23.0 ap367196
  • 23.0 ap367222
  • 23.0 ap367227
  • 23.0 ap367233
  • 23.0 ap367263
  • 23.0 ap367307
  • 23.0 ap367325
  • 23.0 ap367356
  • 23.0 ap367366
  • 23.0 ap367413
  • 23.0 ap367419
  • 23.0 ap367436
  • 23.0 ap367487
  • 23.0 ap367647
  • 23.0 ap367781
  • 23.0 ap367810
  • 23.0 ap367827
  • 23.0 ap367893
  • 23.0 ap367991
  • 23.0 ap368352
  • 23.0 ap368437
  • 23.0 ap368458
  • 23.0 ap368485
  • 23.0 ap368590
  • 23.0 ap368605
  • 23.0 ap368634
  • 23.0 ap368651
  • 23.0 ap368682
  • 23.0 ap368725
  • 23.0 ap368827
  • 23.0 ap368830
  • 23.0 ap368854
  • 23.0 ap368933
  • 23.0 ap369012
  • 23.0 ap369047
  • 23.0 ap369048
  • 23.0 ap369052
  • 23.0 ap369078
  • 23.0 ap369103
  • 23.0 ap369127
  • 23.0 ap369136
  • 23.0 ap369179
  • 23.0 ap369211
  • 23.0 ap369276
  • 23.0 ap369300
  • 23.0 ap369316
  • 23.0 ap369469
  • 23.0 ap369521
  • 23.0 ap369535
  • 23.0 ap369580
  • 23.0 ap369595
  • 23.0 ap369619
  • 23.0 ap369623
  • 23.0 ap369624
  • 23.0 ap369675
  • 23.0 ap369680
  • 23.0 ap369702
  • 23.0 ap369710
  • 23.0 ap369724
  • 23.0 ap369757
  • 23.0 ap369770
  • 23.0 ap369775
  • 23.0 ap369779
  • 23.0 ap369783
  • 23.0 ap369784
  • 23.0 ap369877
  • 23.0 ap369878
  • 23.0 ap369883
  • 23.0 ap369884
  • 23.0 ap369885
  • 23.0 ap369899
  • 23.0 ap369902
  • 23.0 ap369903
  • 23.0 ap369991
  • 23.0 ap369997
  • 23.0 ap370017
  • 23.0 ap370036
  • 23.0 ap370040
  • 23.0 ap370085
  • 23.0 ap370093
  • 23.0 ap370147
  • 23.0 ap370194
  • 23.0 ap370199
  • 23.0 ap370218
  • 23.0 ap370222
  • 23.0 ap370244
  • 23.0 ap370249
  • 23.0 ap370300
  • 23.0 ap370307
  • 23.0 ap370326
  • 23.0 ap370328
  • 23.0 ap370347
  • 23.0 ap370479
  • 23.0 ap370537
  • 23.0 ap370539
  • 23.0 ap370578
  • 23.0 ap370620
  • 23.0 ap370662
  • 23.0 ap370720
  • 23.0 ap370735
  • 23.0 ap370801
  • 23.0 ap370907
  • 23.0 ap370918
  • 23.0 ap370935
  • 23.0 ap371056
  • 23.0 ap371080
  • 23.0 ap371125
  • 23.0 ap371151
  • 23.0 ap371254
  • 23.0 ap371301
  • 23.0 ap371423
  • 23.0 ap371490
  • 23.0 ap371506
  • 23.0 ap371529
  • 23.0 ap371539
  • 23.0 ap371547
  • 23.0 ap371557
  • 23.0 ap371565
  • 23.0 ap371582
  • 23.0 ap371634
  • 23.0 ap371680
  • 23.0 ap371687
  • 23.0 ap371721
  • 23.0 ap371733
  • 23.0 ap371768
  • 23.0 ap371772
  • 23.0 ap371829
  • 23.0 ap371886
  • 23.0 ap371917
  • 23.0 ap371922
  • 23.0 ap371945
  • 23.0 ap371996
  • 23.0 ap372011
  • 23.0 ap372077
  • 23.0 ap372286
  • 23.0 ap372293
  • 23.0 ap372343
  • 23.0 ap372432
  • 23.0 ap372436
  • 23.0 ap372475
  • 23.0 ap372502
  • 23.0 ap372505
  • 23.0 ap372508
  • 23.0 ap372510
  • 23.0 ap372516
  • 23.0 ap372561
  • 23.0 ap372610
  • 23.0 ap372617
  • 23.0 ap372633
  • 23.0 ap372655
  • 23.0 ap372692
  • 23.0 ap372796
  • 23.0 ap372890
  • 23.0 ap372910
  • 23.0 ap372942
  • 23.0 ap372943
  • 23.0 ap372989
  • 23.0 ap373001
  • 23.0 ap373047
  • 23.0 ap373097
  • 23.0 ap373146
  • 23.0 ap373172
  • 23.0 ap373180
  • 23.0 ap373197
  • 23.0 ap373239
  • 23.0 ap373261
  • 23.0 ap373284
  • 23.0 ap373300
  • 23.0 ap373332
  • 23.0 ap373336
  • 23.0 ap373339
  • 23.0 ap373340
  • 23.0 ap373392
  • 23.0 ap373412
  • 23.0 ap373521
  • 23.0 ap373534
  • 23.0 ap373565
  • 23.0 ap373584
  • 23.0 ap373649
  • 23.0 ap373711
  • 23.0 ap373717
  • 23.0 ap373783
  • 23.0 ap373821
  • 23.0 ap373872
  • 23.0 ap373881
  • 23.0 ap373914
  • 23.0 ap373924
  • 23.0 ap374144
  • 23.0 ap374145
  • 23.0 ap374211
  • 23.0 ap374270
  • 23.0 ap374286
  • 23.0 ap374414
  • 23.0 ap374530
  • 23.0 ap374548
  • 23.0 ap374600
  • 23.0 ap374605
  • 23.0 ap374641
  • 23.0 ap374643
  • 23.0 ap374695
  • 23.0 ap374786
  • 23.0 ap374829
  • 23.0 ap374832
  • 23.0 ap374869
  • 23.0 ap374917
  • 23.0 ap374935
  • 23.0 ap374943
  • 23.0 ap374956
  • 23.0 ap375004
  • 23.0 ap375021
  • 23.0 ap375036
  • 23.0 ap375039
  • 23.0 ap375041
  • 23.0 ap375125
  • 23.0 ap375153
  • 23.0 ap375205
  • 23.0 ap375207
  • 23.0 ap375210
  • 23.0 ap375214
  • 23.0 ap375240
  • 23.0 ap375260
  • 23.0 ap375270
  • 23.0 ap375273
  • 23.0 ap375335
  • 23.0 ap375342
  • 23.0 ap375351
  • 23.0 ap375398
  • 23.0 ap375409
  • 23.0 ap375412
  • 23.0 ap375414
  • 23.0 ap375421
  • 23.0 ap375425
  • 23.0 ap375430
  • 23.0 ap375432
  • 23.0 ap375453
  • 23.0 ap375466
  • 23.0 ap375469
  • 23.0 ap375476
  • 23.0 ap375484
  • 23.0 ap375488
  • 23.0 ap375489
  • 23.0 ap375502
  • 23.0 ap375514
  • 23.0 ap375518
  • 23.0 ap375603
  • 23.0 ap375700
  • 23.0 ap375711
  • 23.0 ap375730
  • 23.0 ap375748
  • 23.0 ap375756
  • 23.0 ap375757
  • 23.0 ap375804
  • 23.0 ap375828
  • 23.0 ap375849
  • 23.0 ap375860
  • 23.0 ap375944
  • 23.0 ap375949
  • 23.0 ap375950
  • 23.0 ap375959
  • 23.0 ap375962
  • 23.0 ap375982
  • 23.0 ap375989
  • 23.0 ap375990
  • 23.0 ap375996
  • 23.0 ap376000
  • 23.0 ap376001
  • 23.0 ap376012
  • 23.0 ap376024
  • 23.0 ap376042
  • 23.0 ap376099
  • 23.0 ap376140
  • 23.0 ap376156
  • 23.0 ap376189
  • 23.0 ap376213
  • 23.0 ap376220
  • 23.0 ap376267
  • 23.0 ap376308
  • 23.0 ap376317
  • 23.0 ap376340
  • 23.0 ap376341
  • 23.0 ap376384
  • 23.0 ap376414
  • 23.0 ap376445
  • 23.0 ap376450
  • 23.0 ap376486
  • 23.0 ap376507
  • 23.0 ap376512
  • 23.0 ap376529
  • 23.0 ap376613
  • 23.0 ap376622
  • 23.0 ap376664
  • 23.0 ap376666
  • 23.0 ap376695
  • 23.0 ap376696
  • 23.0 ap376699
  • 23.0 ap376702
  • 23.0 ap376704
  • 23.0 ap376721
  • 23.0 ap376722
  • 23.0 ap376736
  • 23.0 ap376787
  • 23.0 ap376798
  • 23.0 ap376802
  • 23.0 ap376809
  • 23.0 ap376818
  • 23.0 ap376820
  • 23.0 ap376842
  • 23.0 ap376878
  • 23.0 ap376889
  • 23.0 ap376934
  • 23.0 ap376945
  • 23.0 ap376956
  • 23.0 ap376979
  • 23.0 ap377012
  • 23.0 ap377033
  • 23.0 ap377050
  • 23.0 ap377091
  • 23.0 ap377109
  • 23.0 ap377120
  • 23.0 ap377163
  • 23.0 ap377175
  • 23.0 ap377177
  • 23.0 ap377229
  • 23.0 ap377378
  • 23.0 ap377399
  • 23.0 ap377485
  • 23.0 ap377517
  • 23.0 ap377538
  • 23.0 ap377555
  • 23.0 ap377569
  • 23.0 ap377628
  • 23.0 ap377630
  • 23.0 ap377651
  • 23.0 ap377667
  • 23.0 ap377670
  • 23.0 ap377687
  • 23.0 ap377718
  • 23.0 ap377723
  • 23.0 ap377737
  • 23.0 ap377743
  • 23.0 ap377751
  • 23.0 ap377868
  • 23.0 ap377878
  • 23.0 ap377888
  • 23.0 ap377913
  • 23.0 ap377966
  • 23.0 ap377983
  • 23.0 ap378010
  • 23.0 ap378014
  • 23.0 ap378019
  • 23.0 ap378029
  • 23.0 ap378051
  • 23.0 ap378070
  • 23.0 ap378087
  • 23.0 ap378122
  • 23.0 ap378141
  • 23.0 ap378142
  • 23.0 ap378144
  • 23.0 ap378150
  • 23.0 ap378154
  • 23.0 ap378168
  • 23.0 ap378178
  • 23.0 ap378227
  • 23.0 ap378234
  • 23.0 ap378242
  • 23.0 ap378248
  • 23.0 ap378258
  • 23.0 ap378372
  • 23.0 ap378383
  • 23.0 ap378390
  • 23.0 ap378415
  • 23.0 ap378437
  • 23.0 ap378481
  • 23.0 ap378506
  • 23.0 ap378535
  • 23.0 ap378553
  • 23.0 ap378575
  • 23.0 ap378595
  • 23.0 ap378818
  • 23.0 ap378827
  • 23.0 ap378886
  • 23.0 ap378902
  • 23.0 ap378913
  • 23.0 ap378920
  • 23.0 ap378952
  • 23.0 ap378976
  • 23.0 ap378987
  • 23.0 ap378995
  • 23.0 ap379069
  • 23.0 ap379091
  • 23.0 ap379105
  • 23.0 ap379112
  • 23.0 ap379122
  • 23.0 ap379152
  • 23.0 ap379168
  • 23.0 ap379187
  • 23.0 ap379190
  • 23.0 ap379199
  • 23.0 ap379329
  • 23.0 ap379331
  • 23.0 ap379346
  • 23.0 ap379373
  • 23.0 ap379378
  • 23.0 ap379389
  • 23.0 ap379390
  • 23.0 ap379391
  • 23.0 ap379395
  • 23.0 ap379411
  • 23.0 ap379423
  • 23.0 ap379474
  • 23.0 ap379475
  • 23.0 ap379482
  • 23.0 ap379511
  • 23.0 ap379515
  • 23.0 ap379532
  • 23.0 ap379533
  • 23.0 ap379535
  • 23.0 ap379565
  • 23.0 ap379600
  • 23.0 ap379616
  • 23.0 ap379627
  • 23.0 ap379635
  • 23.0 ap379781
  • 23.0 ap379782
  • 23.0 ap379830
  • 23.0 ap379839
  • 23.0 ap379855
  • 23.0 ap379889
  • 23.0 ap379903
  • 23.0 ap379921
  • 23.0 ap379925
  • 23.0 ap379957
  • 23.0 ap379963
  • 23.0 ap380109
  • 23.0 ap380181
  • 23.0 ap380196
  • 23.0 ap380256
  • 23.0 ap380264
  • 23.0 ap380282
  • 23.0 ap380465
  • 23.0 ap380501
  • 23.0 ap380581
  • 23.0 ap380613
  • 23.0 ap380620
  • 23.0 ap380635
  • 23.0 ap380637
  • 23.0 ap380762
  • 23.0 ap380775
  • 23.0 ap380782
  • 23.0 ap380802
  • 23.0 ap380840
  • 23.0 ap380939
  • 23.0 ap381001
  • 23.0 ap381004
  • 23.0 ap381047
  • 23.0 ap381078
  • 23.0 ap381108
  • 23.0 ap381128
  • 23.0 ap381215
  • 23.0 ap381257
  • 23.0 ap381285
  • 23.0 ap381292
  • 23.0 ap381300
  • 23.0 ap381305
  • 23.0 ap381308
  • 23.0 ap381334
  • 23.0 ap381339
  • 23.0 ap381384
  • 23.0 ap381385
  • 23.0 ap381398
  • 23.0 ap381412
  • 23.0 ap381507
  • 23.0 ap381518
  • 23.0 ap381527
  • 23.0 ap381543
  • 23.0 ap381570
  • 23.0 ap381575
  • 23.0 ap381600
  • 23.0 ap381611
  • 23.0 ap381615
  • 23.0 ap381616
  • 23.0 ap381621
  • 23.0 ap381623
  • 23.0 ap381624
  • 23.0 ap381654
  • 23.0 ap381666
  • 23.0 ap381734
  • 23.0 ap381775
  • 23.0 ap381809
  • 23.0 ap381825
  • 23.0 ap381826
  • 23.0 ap381854
  • 23.0 ap381874
  • 23.0 ap381878
  • 23.0 ap381936
  • 23.0 ap381952
  • 23.0 ap381956
  • 23.0 ap381970
  • 23.0 ap381971
  • 23.0 ap381975
  • 23.0 ap382039
  • 23.0 ap382042
  • 23.0 ap382045
  • 23.0 ap382098
  • 23.0 ap382155
  • 23.0 ap382160
  • 23.0 ap382164
  • 23.0 ap382167
  • 23.0 ap382170
  • 23.0 ap382189
  • 23.0 ap382194
  • 23.0 ap382231
  • 23.0 ap382267
  • 23.0 ap382277
  • 23.0 ap382412
  • 23.0 ap382441
  • 23.0 ap382445
  • 23.0 ap382474
  • 23.0 ap382484
  • 23.0 ap382488
  • 23.0 ap382527
  • 23.0 ap382594
  • 23.0 ap382631
  • 23.0 ap382656
  • 23.0 ap382673
  • 23.0 ap382676
  • 23.0 ap382677
  • 23.0 ap382691
  • 23.0 ap382692
  • 23.0 ap382703
  • 23.0 ap382740
  • 23.0 ap382750
  • 23.0 ap382836
  • 23.0 ap382841
  • 23.0 ap382873
  • 23.0 ap382894
  • 23.0 ap382912
  • 23.0 ap382929
  • 23.0 ap382935
  • 23.0 ap382965
  • 23.0 ap382969
  • 23.0 ap382976
  • 23.0 ap382994
  • 23.0 ap383105
  • 23.0 ap383123
  • 23.0 ap383147
  • 23.0 ap383178
  • 23.0 ap383188
  • 23.0 ap383297
  • 23.0 ap383326
  • 23.0 ap383327
  • 23.0 ap383331
  • 23.0 ap383346
  • 23.0 ap383377
  • 23.0 ap383455
  • 23.0 ap383459
  • 23.0 ap383463
  • 23.0 ap383494
  • 23.0 ap383498
  • 23.0 ap383511
  • 23.0 ap383520
  • 23.0 ap383700
  • 23.0 ap383821
  • 23.0 ap384239
  • 23.0 ap384339
  • 23.0 ap384351
  • 23.0 ap384361
  • 23.0 ap384367
  • 23.0 ap384389
  • 23.0 ap384395
  • 23.0 ap384428
  • 23.0 ap384429
  • 23.0 ap384434
  • 23.0 ap384448
  • 23.0 ap384471
  • 23.0 ap384474
  • 23.0 ap384543
  • 23.0 ap384622
  • 23.0 ap384629
  • 23.0 ap384639
  • 23.0 ap384643
  • 23.0 ap384650
  • 22.0 ap347303
  • 22.0 ap352927
  • 22.0 ap353464
  • 22.0 ap363049
  • 22.0 ap358026
  • 22.0 ap375466
  • 22.0 ap383603
  • 22.0 ap362680
  • 22.0 ap356797
  • 22.0 ap353663
  • 22.0 ap357146
  • 22.0 ap357613
  • 22.0 ap371890
  • 22.0 ap356422
  • 22.0 ap376340
  • 22.0 ap362872
  • 22.0 ap381970
  • 22.0 ap377651
  • 22.0 ap383459
  • 22.0 ap376000
  • 22.0 ap357856
  • 22.0 ap380196
  • 22.0 ap372607
  • 22.0 ap362313
  • 22.0 ap371974
  • 22.0 ap372995
  • 22.0 ap377628
  • 22.0 ap365983
  • 22.0 ap371721
  • 22.0 ap352180
  • 22.0 ap358511
  • 22.0 ap364753
  • 22.0 ap373004
  • 22.0 ap376634
  • 22.0 ap382236
  • 22.0 ap353419
  • 22.0 ap372922
  • 22.0 ap382206
  • 22.0 ap383594
  • 22.0 ap366609
  • 22.0 ap380756
  • 22.0 ap349400
  • 22.0 ap366395
  • 22.0 ap366443
  • 22.0 ap372455
  • 22.0 ap347895
  • 22.0 ap372533
  • 22.0 ap366842
  • 22.0 ap353025
  • 22.0 ap351936
  • 22.0 ap353315
  • 22.0 ap352341
  • 22.0 ap339584
  • 22.0 ap352961
  • 22.0 ap359922
  • 22.0 ap353558
  • 22.0 ap371725
  • 22.0 ap371432
  • 22.0 ap357819
  • 22.0 ap358289
  • 22.0 ap354719
  • 22.0 ap367227
  • 22.0 ap364519
  • 22.0 ap367014
  • 22.0 ap360797
  • 22.0 ap366120
  • 22.0 ap372207
  • 22.0 ap365829
  • 22.0 ap365979
  • 22.0 ap366993
  • 22.0 ap365124
  • 22.0 ap366763
  • 22.0 ap352238
  • 22.0 ap383319
  • 22.0 ap372071
  • 22.0 ap354673
  • 22.0 ap371868
  • 22.0 ap353954
  • 22.0 ap366800
  • 22.0 ap357760
  • 22.0 ap366857
  • 22.0 ap365886
  • 22.0 ap372116
  • 22.0 ap354726
  • 22.0 ap364956
  • 22.0 ap382703
  • 22.0 ap367293
  • 22.0 ap366307
  • 22.0 ap352359
  • 22.0 ap376001
  • 22.0 ap366411
  • 22.0 ap365773
  • 22.0 ap362262
  • 22.0 ap351205
  • 22.0 ap383512
  • 22.0 ap355020
  • 22.0 ap352985
  • 22.0 ap354580
  • 22.0 ap373821
  • 22.0 ap376308
  • 22.0 ap353140
  • 22.0 ap374668
  • 22.0 ap372079
  • 22.0 ap366684
  • 22.0 ap366398
  • 22.0 ap358328
  • 22.0 ap373016
  • 22.0 ap358597
  • 22.0 ap383346
  • 22.0 ap374786
  • 22.0 ap348687
  • 22.0 ap352498
  • 22.0 ap366247
  • 22.0 ap351868
  • 22.0 ap383494
  • 22.0 ap367419
  • 22.0 ap369731
  • 22.0 ap383511
  • 22.0 ap382493
  • 22.0 ap365030
  • 22.0 ap372121
  • 22.0 ap371748
  • 22.0 ap372345
  • 22.0 ap365386
  • 22.0 ap365017
  • 22.0 ap355740
  • 22.0 ap365014
  • 22.0 ap365351
  • 22.0 ap364843
  • 22.0 ap374715
  • 22.0 ap364718
  • 22.0 ap363394
  • 22.0 ap364467
  • 22.0 ap365348
  • 22.0 ap359767
  • 22.0 ap364754
  • 22.0 ap365066
  • 22.0 ap370147
  • 22.0 ap365682
  • 22.0 ap365246
  • 22.0 ap364863
  • 22.0 ap365155
  • 22.0 ap381952
  • 22.0 ap370792
  • 22.0 ap363768
  • 22.0 ap366606
  • 22.0 ap363644
  • 22.0 ap376140
  • 22.0 ap367446
  • 22.0 ap362261
  • 22.0 ap374188
  • 22.0 ap376088
  • 22.0 ap374069
  • 22.0 ap374182
  • 22.0 ap377012
  • 22.0 ap382484
  • 22.0 ap373752
  • 22.0 ap373912
  • 22.0 ap374143
  • 22.0 ap381654
  • 22.0 ap350604
  • 22.0 ap369749
  • 22.0 ap377378
  • 22.0 ap360755
  • 22.0 ap369991
  • 22.0 ap379839
  • 22.0 ap358894
  • 22.0 ap360867
  • 22.0 ap359973
  • 22.0 ap354412
  • 22.0 ap373871
  • 22.0 ap377176
  • 22.0 ap358699
  • 22.0 ap374125
  • 22.0 ap358890
  • 22.0 ap352126
  • 22.0 ap351795
  • 22.0 ap349845
  • 22.0 ap357595
  • 22.0 ap352143
  • 22.0 ap357736
  • 22.0 ap352651
  • 22.0 ap351682
  • 22.0 ap348143
  • 22.0 ap351798
  • 22.0 ap352345
  • 22.0 ap354685
  • 22.0 ap352357
  • 22.0 ap358338
  • 22.0 ap351179
  • 22.0 ap361155
  • 22.0 ap356842
  • 22.0 ap357918
  • 22.0 ap355907
  • 22.0 ap358133
  • 22.0 ap354314
  • 22.0 ap371811
  • 22.0 ap361516
  • 22.0 ap357176
  • 22.0 ap352386
  • 22.0 ap358188
  • 22.0 ap357562
  • 22.0 ap360464
  • 22.0 ap357623
  • 22.0 ap366967
  • 22.0 ap383520
  • 22.0 ap369899
  • 22.0 ap361651
  • 22.0 ap371565
  • 22.0 ap355753
  • 22.0 ap371547
  • 22.0 ap350538
  • 22.0 ap359791
  • 22.0 ap372516
  • 22.0 ap372692
  • 22.0 ap357802
  • 22.0 ap358089
  • 22.0 ap371506
  • 22.0 ap366335
  • 22.0 ap362035
  • 22.0 ap362749
  • 22.0 ap353845
  • 22.0 ap352293
  • 22.0 ap381348
  • 22.0 ap354736
  • 22.0 ap350140
  • 22.0 ap381357
  • 22.0 ap371634
  • 22.0 ap371687
  • 22.0 ap355298
  • 22.0 ap372610
  • 22.0 ap366525
  • 22.0 ap374711
  • 22.0 ap366201
  • 22.0 ap373778
  • 22.0 ap354129
  • 22.0 ap369702
  • 22.0 ap381384
  • 22.0 ap352796
  • 22.0 ap350990
  • 22.0 ap358314
  • 22.0 ap368827
  • 22.0 ap372239
  • 22.0 ap372796
  • 22.0 ap349254
  • 22.0 ap368682
  • 22.0 ap366275
  • 22.0 ap354690
  • 22.0 ap365744
  • 22.0 ap354779
  • 22.0 ap368458
  • 22.0 ap366296
  • 22.0 ap364518
  • 22.0 ap352887
  • 22.0 ap374600
  • 22.0 ap351015
  • 22.0 ap371698
  • 22.0 ap366610
  • 22.0 ap367647
  • 22.0 ap371747
  • 22.0 ap368352
  • 22.0 ap375502
  • 22.0 ap371829
  • 22.0 ap372343
  • 22.0 ap364560
  • 22.0 ap364622
  • 22.0 ap359172
  • 22.0 ap383821
  • 22.0 ap353515
  • 22.0 ap362960
  • 22.0 ap369048
  • 22.0 ap365626
  • 22.0 ap364711
  • 22.0 ap362364
  • 22.0 ap362149
  • 22.0 ap362747
  • 22.0 ap382164
  • 22.0 ap358013
  • 22.0 ap382170
  • 22.0 ap368830
  • 22.0 ap364960
  • 22.0 ap361024
  • 22.0 ap362708
  • 22.0 ap381874
  • 22.0 ap371314
  • 22.0 ap364009
  • 22.0 ap361577
  • 22.0 ap382155
  • 22.0 ap361008
  • 22.0 ap371319
  • 22.0 ap364862
  • 22.0 ap371530
  • 22.0 ap364897
  • 22.0 ap352835
  • 22.0 ap365946
  • 22.0 ap362964
  • 22.0 ap360906
  • 22.0 ap376702
  • 22.0 ap371268
  • 22.0 ap370017
  • 22.0 ap361354
  • 22.0 ap361100
  • 22.0 ap361507
  • 22.0 ap378010
  • 22.0 ap355126
  • 22.0 ap360503
  • 22.0 ap362963
  • 22.0 ap357187
  • 22.0 ap382864
  • 22.0 ap353015
  • 22.0 ap371456
  • 22.0 ap371582
  • 22.0 ap372012
  • 22.0 ap383716
  • 22.0 ap383909
  • 22.0 ap383701
  • 22.0 ap342175
  • 22.0 ap339371
  • 22.0 ap353835
  • 22.0 ap351023
  • 22.0 ap354154
  • 22.0 ap353865
  • 22.0 ap350800
  • 22.0 ap350032
  • 22.0 ap349201
  • 22.0 ap353120
  • 22.0 ap351924
  • 22.0 ap351817
  • 22.0 ap353549
  • 22.0 ap353179
  • 22.0 ap351960
  • 22.0 ap352304
  • 22.0 ap353390
  • 22.0 ap352707
  • 22.0 ap355636
  • 22.0 ap352837
  • 22.0 ap353311
  • 22.0 ap352337
  • 22.0 ap355300
  • 22.0 ap356412
  • 22.0 ap355946
  • 22.0 ap355647
  • 22.0 ap356253
  • 22.0 ap354528
  • 22.0 ap355353
  • 22.0 ap356359
  • 22.0 ap355952
  • 22.0 ap354909
  • 22.0 ap355616
  • 22.0 ap356749
  • 22.0 ap357347
  • 22.0 ap354597
  • 22.0 ap356319
  • 22.0 ap356774
  • 22.0 ap356551
  • 22.0 ap351262
  • 22.0 ap357040
  • 22.0 ap357525
  • 22.0 ap357447
  • 22.0 ap357560
  • 22.0 ap357608
  • 22.0 ap357655
  • 22.0 ap357597
  • 22.0 ap358099
  • 22.0 ap357523
  • 22.0 ap357621
  • 22.0 ap357795
  • 22.0 ap358291
  • 22.0 ap359434
  • 22.0 ap358290
  • 22.0 ap358119
  • 22.0 ap359549
  • 22.0 ap358603
  • 22.0 ap359674
  • 22.0 ap359121
  • 22.0 ap360250
  • 22.0 ap360564
  • 22.0 ap359106
  • 22.0 ap359218
  • 22.0 ap359769
  • 22.0 ap360164
  • 22.0 ap359001
  • 22.0 ap360365
  • 22.0 ap360816
  • 22.0 ap361116
  • 22.0 ap361353
  • 22.0 ap361076
  • 22.0 ap360531
  • 22.0 ap362367
  • 22.0 ap362683
  • 22.0 ap362276
  • 22.0 ap362707
  • 22.0 ap361934
  • 22.0 ap363082
  • 22.0 ap361154
  • 22.0 ap362122
  • 22.0 ap364194
  • 22.0 ap361666
  • 22.0 ap362492
  • 22.0 ap363753
  • 22.0 ap362644
  • 22.0 ap367820
  • 22.0 ap362575
  • 22.0 ap363361
  • 22.0 ap363760
  • 22.0 ap364048
  • 22.0 ap363233
  • 22.0 ap363666
  • 22.0 ap363568
  • 22.0 ap367974
  • 22.0 ap364278
  • 22.0 ap363824
  • 22.0 ap368067
  • 22.0 ap363976
  • 22.0 ap364213
  • 22.0 ap364275
  • 22.0 ap366397
  • 22.0 ap366624
  • 22.0 ap363582
  • 22.0 ap364125
  • 22.0 ap366252
  • 22.0 ap363408
  • 22.0 ap366715
  • 22.0 ap364214
  • 22.0 ap364258
  • 22.0 ap366784
  • 22.0 ap366358
  • 22.0 ap366180
  • 22.0 ap365172
  • 22.0 ap366430
  • 22.0 ap364778
  • 22.0 ap364834
  • 22.0 ap364521
  • 22.0 ap364905
  • 22.0 ap364844
  • 22.0 ap364635
  • 22.0 ap367298
  • 22.0 ap365171
  • 22.0 ap364924
  • 22.0 ap365905
  • 22.0 ap365515
  • 22.0 ap367001
  • 22.0 ap365577
  • 22.0 ap365759
  • 22.0 ap365758
  • 22.0 ap367290
  • 22.0 ap367183
  • 22.0 ap371654
  • 22.0 ap371703
  • 22.0 ap365511
  • 22.0 ap365576
  • 22.0 ap370802
  • 22.0 ap365944
  • 22.0 ap366959
  • 22.0 ap371202
  • 22.0 ap365858
  • 22.0 ap371919
  • 22.0 ap367294
  • 22.0 ap371343
  • 22.0 ap367206
  • 22.0 ap371134
  • 22.0 ap372178
  • 22.0 ap371926
  • 22.0 ap372017
  • 22.0 ap371681
  • 22.0 ap372192
  • 22.0 ap371610
  • 22.0 ap371546
  • 22.0 ap371281
  • 22.0 ap371770
  • 22.0 ap370908
  • 22.0 ap368308
  • 22.0 ap371195
  • 22.0 ap371366
  • 22.0 ap368140
  • 22.0 ap371977
  • 22.0 ap371682
  • 22.0 ap371627
  • 22.0 ap369641
  • 22.0 ap369855
  • 22.0 ap368195
  • 22.0 ap368957
  • 22.0 ap368612
  • 22.0 ap368568
  • 22.0 ap368217
  • 22.0 ap369529
  • 22.0 ap368096
  • 22.0 ap368601
  • 22.0 ap368970
  • 22.0 ap369881
  • 22.0 ap369550
  • 22.0 ap369295
  • 22.0 ap369473
  • 22.0 ap369065
  • 22.0 ap372433
  • 22.0 ap372567
  • 22.0 ap372522
  • 22.0 ap369800
  • 22.0 ap372389
  • 22.0 ap372560
  • 22.0 ap370563
  • 22.0 ap370344
  • 22.0 ap372623
  • 22.0 ap370424
  • 22.0 ap370170
  • 22.0 ap374680
  • 22.0 ap374169
  • 22.0 ap374799
  • 22.0 ap370437
  • 22.0 ap374430
  • 22.0 ap374677
  • 22.0 ap372968
  • 22.0 ap373118
  • 22.0 ap373855
  • 22.0 ap373438
  • 22.0 ap374660
  • 22.0 ap373391
  • 22.0 ap373196
  • 22.0 ap373732
  • 22.0 ap374113
  • 22.0 ap373034
  • 22.0 ap373189
  • 22.0 ap374488
  • 22.0 ap374354
  • 22.0 ap373285
  • 22.0 ap373108
  • 22.0 ap374238
  • 22.0 ap373315
  • 22.0 ap373299
  • 22.0 ap373137
  • 22.0 ap373482
  • 22.0 ap375734
  • 22.0 ap375625
  • 22.0 ap375862
  • 22.0 ap373318
  • 22.0 ap375441
  • 22.0 ap375200
  • 22.0 ap374131
  • 22.0 ap373008
  • 22.0 ap376504
  • 22.0 ap376355
  • 22.0 ap372799
  • 22.0 ap376577
  • 22.0 ap374977
  • 22.0 ap375206
  • 22.0 ap375309
  • 22.0 ap375937
  • 22.0 ap375465
  • 22.0 ap375464
  • 22.0 ap375865
  • 22.0 ap375672
  • 22.0 ap375793
  • 22.0 ap374891
  • 22.0 ap376100
  • 22.0 ap375382
  • 22.0 ap375383
  • 22.0 ap375661
  • 22.0 ap375709
  • 22.0 ap375984
  • 22.0 ap375719
  • 22.0 ap376117
  • 22.0 ap376535
  • 22.0 ap375654
  • 22.0 ap375133
  • 22.0 ap375413
  • 22.0 ap379838
  • 22.0 ap375797
  • 22.0 ap379775
  • 22.0 ap380446
  • 22.0 ap379752
  • 22.0 ap376261
  • 22.0 ap380232
  • 22.0 ap375720
  • 22.0 ap380506
  • 22.0 ap380108
  • 22.0 ap376633
  • 22.0 ap379917
  • 22.0 ap380201
  • 22.0 ap379951
  • 22.0 ap380507
  • 22.0 ap380449
  • 22.0 ap380137
  • 22.0 ap376988
  • 22.0 ap376989
  • 22.0 ap376752
  • 22.0 ap376642
  • 22.0 ap377225
  • 22.0 ap376953
  • 22.0 ap376935
  • 22.0 ap377497
  • 22.0 ap376652
  • 22.0 ap380130
  • 22.0 ap376762
  • 22.0 ap377982
  • 22.0 ap376844
  • 22.0 ap377625
  • 22.0 ap377483
  • 22.0 ap377042
  • 22.0 ap378334
  • 22.0 ap377389
  • 22.0 ap378055
  • 22.0 ap378485
  • 22.0 ap378257
  • 22.0 ap377164
  • 22.0 ap378393
  • 22.0 ap378025
  • 22.0 ap377409
  • 22.0 ap378419
  • 22.0 ap377327
  • 22.0 ap378161
  • 22.0 ap377045
  • 22.0 ap378866
  • 22.0 ap379461
  • 22.0 ap379326
  • 22.0 ap378079
  • 22.0 ap377715
  • 22.0 ap379151
  • 22.0 ap379350
  • 22.0 ap379427
  • 22.0 ap379493
  • 22.0 ap379556
  • 22.0 ap379153
  • 22.0 ap382225
  • 22.0 ap380555
  • 22.0 ap381137
  • 22.0 ap382032
  • 22.0 ap382362
  • 22.0 ap381275
  • 22.0 ap381622
  • 22.0 ap380970
  • 22.0 ap382251
  • 22.0 ap382372
  • 22.0 ap381009
  • 22.0 ap381140
  • 22.0 ap381504
  • 22.0 ap382409
  • 22.0 ap382993
  • 22.0 ap382951
  • 22.0 ap383655
  • 22.0 ap382615
  • 22.0 ap382903
  • 22.0 ap382838
  • 22.0 ap382476
  • 22.0 ap347536
  • 22.0 ap347644
  • 22.0 ap347645
  • 22.0 ap347673
  • 22.0 ap347677
  • 22.0 ap347726
  • 22.0 ap348474
  • 22.0 ap348575
  • 22.0 ap348766
  • 22.0 ap349235
  • 22.0 ap349441
  • 22.0 ap349501
  • 22.0 ap349582
  • 22.0 ap349664
  • 22.0 ap349820
  • 22.0 ap349858
  • 22.0 ap350056
  • 22.0 ap350175
  • 22.0 ap350471
  • 22.0 ap350527
  • 22.0 ap350564
  • 22.0 ap350603
  • 22.0 ap350864
  • 22.0 ap350908
  • 22.0 ap350969
  • 22.0 ap351199
  • 22.0 ap351223
  • 22.0 ap351246
  • 22.0 ap351345
  • 22.0 ap351527
  • 22.0 ap351727
  • 22.0 ap351744
  • 22.0 ap351942
  • 22.0 ap352184
  • 22.0 ap352203
  • 22.0 ap352264
  • 22.0 ap352323
  • 22.0 ap352369
  • 22.0 ap352423
  • 22.0 ap352511
  • 22.0 ap352697
  • 22.0 ap352711
  • 22.0 ap352804
  • 22.0 ap352805
  • 22.0 ap352824
  • 22.0 ap352915
  • 22.0 ap352954
  • 22.0 ap353001
  • 22.0 ap353122
  • 22.0 ap353137
  • 22.0 ap353167
  • 22.0 ap353168
  • 22.0 ap353354
  • 22.0 ap353389
  • 22.0 ap353623
  • 22.0 ap353658
  • 22.0 ap353708
  • 22.0 ap353812
  • 22.0 ap353836
  • 22.0 ap353839
  • 22.0 ap353852
  • 22.0 ap353856
  • 22.0 ap353870
  • 22.0 ap353985
  • 22.0 ap354005
  • 22.0 ap354077
  • 22.0 ap354164
  • 22.0 ap354170
  • 22.0 ap354195
  • 22.0 ap354200
  • 22.0 ap354316
  • 22.0 ap354365
  • 22.0 ap354380
  • 22.0 ap354415
  • 22.0 ap354438
  • 22.0 ap354439
  • 22.0 ap354535
  • 22.0 ap354556
  • 22.0 ap354616
  • 22.0 ap354681
  • 22.0 ap354942
  • 22.0 ap355002
  • 22.0 ap355003
  • 22.0 ap355069
  • 22.0 ap355102
  • 22.0 ap355112
  • 22.0 ap355121
  • 22.0 ap355124
  • 22.0 ap355125
  • 22.0 ap355197
  • 22.0 ap355201
  • 22.0 ap355236
  • 22.0 ap355265
  • 22.0 ap355283
  • 22.0 ap355356
  • 22.0 ap355568
  • 22.0 ap355599
  • 22.0 ap355628
  • 22.0 ap355637
  • 22.0 ap355639
  • 22.0 ap355640
  • 22.0 ap355664
  • 22.0 ap355669
  • 22.0 ap355670
  • 22.0 ap355806
  • 22.0 ap355820
  • 22.0 ap355833
  • 22.0 ap355836
  • 22.0 ap355838
  • 22.0 ap355896
  • 22.0 ap355897
  • 22.0 ap356007
  • 22.0 ap356029
  • 22.0 ap356141
  • 22.0 ap356142
  • 22.0 ap356152
  • 22.0 ap356231
  • 22.0 ap356254
  • 22.0 ap356301
  • 22.0 ap356320
  • 22.0 ap356345
  • 22.0 ap356353
  • 22.0 ap356497
  • 22.0 ap356527
  • 22.0 ap356570
  • 22.0 ap356575
  • 22.0 ap356589
  • 22.0 ap356707
  • 22.0 ap356752
  • 22.0 ap356935
  • 22.0 ap356969
  • 22.0 ap356978
  • 22.0 ap357019
  • 22.0 ap357029
  • 22.0 ap357039
  • 22.0 ap357081
  • 22.0 ap357105
  • 22.0 ap357162
  • 22.0 ap357172
  • 22.0 ap357181
  • 22.0 ap357185
  • 22.0 ap357330
  • 22.0 ap357366
  • 22.0 ap357387
  • 22.0 ap357405
  • 22.0 ap357413
  • 22.0 ap357417
  • 22.0 ap357452
  • 22.0 ap357454
  • 22.0 ap357507
  • 22.0 ap357508
  • 22.0 ap357610
  • 22.0 ap357624
  • 22.0 ap357653
  • 22.0 ap357670
  • 22.0 ap357675
  • 22.0 ap357761
  • 22.0 ap357889
  • 22.0 ap357915
  • 22.0 ap357917
  • 22.0 ap358012
  • 22.0 ap358046
  • 22.0 ap358082
  • 22.0 ap358096
  • 22.0 ap358128
  • 22.0 ap358241
  • 22.0 ap358271
  • 22.0 ap358330
  • 22.0 ap358360
  • 22.0 ap358365
  • 22.0 ap358440
  • 22.0 ap358441
  • 22.0 ap358513
  • 22.0 ap358521
  • 22.0 ap358568
  • 22.0 ap358604
  • 22.0 ap358643
  • 22.0 ap358651
  • 22.0 ap358681
  • 22.0 ap358707
  • 22.0 ap358730
  • 22.0 ap358732
  • 22.0 ap358737
  • 22.0 ap358845
  • 22.0 ap358870
  • 22.0 ap358891
  • 22.0 ap358901
  • 22.0 ap358907
  • 22.0 ap358920
  • 22.0 ap358942
  • 22.0 ap358943
  • 22.0 ap358944
  • 22.0 ap359044
  • 22.0 ap359118
  • 22.0 ap359130
  • 22.0 ap359153
  • 22.0 ap359164
  • 22.0 ap359186
  • 22.0 ap359191
  • 22.0 ap359225
  • 22.0 ap359259
  • 22.0 ap359292
  • 22.0 ap359298
  • 22.0 ap359324
  • 22.0 ap359421
  • 22.0 ap359424
  • 22.0 ap359458
  • 22.0 ap359464
  • 22.0 ap359492
  • 22.0 ap359562
  • 22.0 ap359570
  • 22.0 ap359612
  • 22.0 ap359657
  • 22.0 ap359710
  • 22.0 ap359772
  • 22.0 ap359775
  • 22.0 ap359812
  • 22.0 ap359826
  • 22.0 ap359851
  • 22.0 ap359892
  • 22.0 ap359925
  • 22.0 ap360167
  • 22.0 ap360198
  • 22.0 ap360231
  • 22.0 ap360245
  • 22.0 ap360319
  • 22.0 ap360375
  • 22.0 ap360563
  • 22.0 ap360603
  • 22.0 ap360627
  • 22.0 ap360790
  • 22.0 ap360874
  • 22.0 ap360943
  • 22.0 ap360955
  • 22.0 ap361062
  • 22.0 ap361080
  • 22.0 ap361379
  • 22.0 ap361414
  • 22.0 ap361444
  • 22.0 ap361453
  • 22.0 ap361459
  • 22.0 ap361519
  • 22.0 ap361537
  • 22.0 ap361549
  • 22.0 ap361551
  • 22.0 ap361581
  • 22.0 ap361596
  • 22.0 ap361620
  • 22.0 ap361631
  • 22.0 ap361640
  • 22.0 ap361643
  • 22.0 ap361679
  • 22.0 ap361691
  • 22.0 ap361823
  • 22.0 ap361831
  • 22.0 ap361847
  • 22.0 ap361930
  • 22.0 ap361936
  • 22.0 ap361997
  • 22.0 ap361999
  • 22.0 ap362015
  • 22.0 ap362019
  • 22.0 ap362041
  • 22.0 ap362080
  • 22.0 ap362120
  • 22.0 ap362128
  • 22.0 ap362141
  • 22.0 ap362193
  • 22.0 ap362263
  • 22.0 ap362269
  • 22.0 ap362314
  • 22.0 ap362316
  • 22.0 ap362324
  • 22.0 ap362363
  • 22.0 ap362365
  • 22.0 ap362368
  • 22.0 ap362372
  • 22.0 ap362389
  • 22.0 ap362525
  • 22.0 ap362677
  • 22.0 ap362681
  • 22.0 ap362691
  • 22.0 ap362693
  • 22.0 ap362712
  • 22.0 ap362741
  • 22.0 ap362766
  • 22.0 ap362769
  • 22.0 ap362868
  • 22.0 ap363023
  • 22.0 ap363130
  • 22.0 ap363136
  • 22.0 ap363197
  • 22.0 ap363208
  • 22.0 ap363221
  • 22.0 ap363240
  • 22.0 ap363247
  • 22.0 ap363297
  • 22.0 ap363298
  • 22.0 ap363305
  • 22.0 ap363330
  • 22.0 ap363412
  • 22.0 ap363415
  • 22.0 ap363431
  • 22.0 ap363433
  • 22.0 ap363530
  • 22.0 ap363556
  • 22.0 ap363560
  • 22.0 ap363565
  • 22.0 ap363577
  • 22.0 ap363609
  • 22.0 ap363641
  • 22.0 ap363672
  • 22.0 ap363691
  • 22.0 ap363693
  • 22.0 ap363694
  • 22.0 ap363705
  • 22.0 ap363707
  • 22.0 ap363710
  • 22.0 ap363727
  • 22.0 ap363811
  • 22.0 ap363844
  • 22.0 ap363845
  • 22.0 ap363984
  • 22.0 ap364003
  • 22.0 ap364030
  • 22.0 ap364100
  • 22.0 ap364101
  • 22.0 ap364107
  • 22.0 ap364113
  • 22.0 ap364146
  • 22.0 ap364148
  • 22.0 ap364150
  • 22.0 ap364154
  • 22.0 ap364157
  • 22.0 ap364210
  • 22.0 ap364241
  • 22.0 ap364248
  • 22.0 ap364252
  • 22.0 ap364260
  • 22.0 ap364347
  • 22.0 ap364357
  • 22.0 ap364385
  • 22.0 ap364483
  • 22.0 ap364532
  • 22.0 ap364562
  • 22.0 ap364582
  • 22.0 ap364598
  • 22.0 ap364611
  • 22.0 ap364617
  • 22.0 ap364621
  • 22.0 ap364628
  • 22.0 ap364634
  • 22.0 ap364636
  • 22.0 ap364705
  • 22.0 ap364755
  • 22.0 ap364825
  • 22.0 ap365040
  • 22.0 ap365044
  • 22.0 ap365090
  • 22.0 ap365186
  • 22.0 ap365227
  • 22.0 ap365257
  • 22.0 ap365357
  • 22.0 ap365530
  • 22.0 ap365531
  • 22.0 ap365598
  • 22.0 ap365633
  • 22.0 ap365639
  • 22.0 ap365640
  • 22.0 ap365646
  • 22.0 ap365661
  • 22.0 ap365689
  • 22.0 ap365701
  • 22.0 ap365770
  • 22.0 ap365771
  • 22.0 ap365798
  • 22.0 ap365832
  • 22.0 ap365900
  • 22.0 ap365984
  • 22.0 ap366013
  • 22.0 ap366179
  • 22.0 ap366264
  • 22.0 ap366321
  • 22.0 ap366334
  • 22.0 ap366346
  • 22.0 ap366366
  • 22.0 ap366390
  • 22.0 ap366661
  • 22.0 ap366748
  • 22.0 ap366834
  • 22.0 ap366835
  • 22.0 ap366836
  • 22.0 ap366879
  • 22.0 ap366905
  • 22.0 ap366917
  • 22.0 ap366940
  • 22.0 ap366968
  • 22.0 ap366982
  • 22.0 ap366984
  • 22.0 ap366986
  • 22.0 ap366992
  • 22.0 ap366997
  • 22.0 ap367006
  • 22.0 ap367222
  • 22.0 ap367223
  • 22.0 ap367233
  • 22.0 ap367263
  • 22.0 ap384120
  • 22.0 ap367292
  • 22.0 ap367307
  • 22.0 ap367323
  • 22.0 ap367324
  • 22.0 ap367325
  • 22.0 ap367335
  • 22.0 ap367356
  • 22.0 ap367413
  • 22.0 ap367436
  • 22.0 ap367451
  • 22.0 ap367487
  • 22.0 ap367488
  • 22.0 ap367501
  • 22.0 ap367547
  • 22.0 ap367781
  • 22.0 ap367810
  • 22.0 ap367816
  • 22.0 ap367857
  • 22.0 ap367893
  • 22.0 ap367895
  • 22.0 ap367985
  • 22.0 ap367991
  • 22.0 ap367992
  • 22.0 ap368000
  • 22.0 ap368057
  • 22.0 ap368073
  • 22.0 ap368127
  • 22.0 ap368163
  • 22.0 ap368179
  • 22.0 ap368196
  • 22.0 ap368214
  • 22.0 ap368350
  • 22.0 ap368408
  • 22.0 ap368437
  • 22.0 ap368485
  • 22.0 ap368517
  • 22.0 ap368590
  • 22.0 ap368605
  • 22.0 ap368613
  • 22.0 ap368643
  • 22.0 ap368651
  • 22.0 ap368725
  • 22.0 ap368743
  • 22.0 ap368854
  • 22.0 ap368933
  • 22.0 ap369012
  • 22.0 ap369052
  • 22.0 ap369078
  • 22.0 ap369087
  • 22.0 ap369127
  • 22.0 ap369136
  • 22.0 ap369179
  • 22.0 ap369256
  • 22.0 ap369300
  • 22.0 ap369316
  • 22.0 ap369469
  • 22.0 ap369470
  • 22.0 ap369472
  • 22.0 ap369474
  • 22.0 ap369476
  • 22.0 ap369477
  • 22.0 ap369479
  • 22.0 ap369535
  • 22.0 ap369595
  • 22.0 ap369608
  • 22.0 ap369619
  • 22.0 ap369624
  • 22.0 ap369680
  • 22.0 ap369710
  • 22.0 ap369716
  • 22.0 ap369724
  • 22.0 ap369730
  • 22.0 ap369757
  • 22.0 ap369763
  • 22.0 ap369770
  • 22.0 ap369775
  • 22.0 ap369779
  • 22.0 ap369784
  • 22.0 ap369877
  • 22.0 ap369878
  • 22.0 ap369883
  • 22.0 ap369884
  • 22.0 ap369885
  • 22.0 ap369902
  • 22.0 ap369903
  • 22.0 ap369928
  • 22.0 ap370040
  • 22.0 ap370085
  • 22.0 ap370088
  • 22.0 ap370093
  • 22.0 ap370199
  • 22.0 ap370246
  • 22.0 ap370300
  • 22.0 ap370307
  • 22.0 ap370326
  • 22.0 ap370328
  • 22.0 ap370362
  • 22.0 ap370383
  • 22.0 ap370426
  • 22.0 ap370442
  • 22.0 ap370464
  • 22.0 ap370479
  • 22.0 ap370537
  • 22.0 ap370539
  • 22.0 ap370578
  • 22.0 ap370603
  • 22.0 ap370620
  • 22.0 ap370662
  • 22.0 ap370676
  • 22.0 ap370707
  • 22.0 ap370720
  • 22.0 ap370735
  • 22.0 ap370739
  • 22.0 ap370763
  • 22.0 ap370777
  • 22.0 ap370786
  • 22.0 ap370801
  • 22.0 ap370907
  • 22.0 ap370909
  • 22.0 ap370918
  • 22.0 ap370935
  • 22.0 ap371021
  • 22.0 ap371024
  • 22.0 ap371052
  • 22.0 ap371056
  • 22.0 ap371091
  • 22.0 ap371099
  • 22.0 ap371151
  • 22.0 ap371233
  • 22.0 ap371246
  • 22.0 ap371254
  • 22.0 ap371258
  • 22.0 ap371259
  • 22.0 ap371261
  • 22.0 ap371269
  • 22.0 ap371291
  • 22.0 ap371301
  • 22.0 ap371310
  • 22.0 ap371327
  • 22.0 ap371368
  • 22.0 ap371423
  • 22.0 ap371459
  • 22.0 ap371490
  • 22.0 ap371500
  • 22.0 ap371529
  • 22.0 ap371539
  • 22.0 ap371543
  • 22.0 ap371557
  • 22.0 ap371604
  • 22.0 ap371605
  • 22.0 ap371669
  • 22.0 ap371733
  • 22.0 ap371768
  • 22.0 ap371772
  • 22.0 ap371779
  • 22.0 ap371793
  • 22.0 ap371835
  • 22.0 ap371886
  • 22.0 ap371917
  • 22.0 ap371922
  • 22.0 ap371935
  • 22.0 ap371945
  • 22.0 ap371996
  • 22.0 ap371998
  • 22.0 ap372011
  • 22.0 ap372068
  • 22.0 ap372085
  • 22.0 ap372115
  • 22.0 ap372211
  • 22.0 ap372286
  • 22.0 ap372292
  • 22.0 ap372397
  • 22.0 ap372405
  • 22.0 ap372432
  • 22.0 ap372464
  • 22.0 ap372475
  • 22.0 ap372502
  • 22.0 ap372505
  • 22.0 ap372508
  • 22.0 ap372510
  • 22.0 ap372561
  • 22.0 ap372574
  • 22.0 ap372588
  • 22.0 ap372617
  • 22.0 ap372633
  • 22.0 ap372655
  • 22.0 ap372696
  • 22.0 ap372821
  • 22.0 ap372890
  • 22.0 ap372910
  • 22.0 ap372929
  • 22.0 ap372942
  • 22.0 ap372943
  • 22.0 ap372989
  • 22.0 ap373001
  • 22.0 ap373009
  • 22.0 ap373017
  • 22.0 ap373097
  • 22.0 ap373146
  • 22.0 ap373173
  • 22.0 ap373174
  • 22.0 ap373180
  • 22.0 ap373182
  • 22.0 ap373197
  • 22.0 ap373239
  • 22.0 ap373256
  • 22.0 ap373300
  • 22.0 ap373330
  • 22.0 ap373332
  • 22.0 ap373336
  • 22.0 ap373339
  • 22.0 ap373340
  • 22.0 ap373358
  • 22.0 ap373392
  • 22.0 ap373412
  • 22.0 ap373480
  • 22.0 ap373511
  • 22.0 ap373521
  • 22.0 ap373534
  • 22.0 ap373565
  • 22.0 ap373584
  • 22.0 ap373589
  • 22.0 ap373622
  • 22.0 ap373649
  • 22.0 ap373711
  • 22.0 ap373717
  • 22.0 ap373769
  • 22.0 ap373783
  • 22.0 ap373870
  • 22.0 ap373872
  • 22.0 ap373881
  • 22.0 ap373914
  • 22.0 ap373952
  • 22.0 ap373958
  • 22.0 ap374037
  • 22.0 ap374055
  • 22.0 ap374085
  • 22.0 ap374109
  • 22.0 ap374135
  • 22.0 ap374144
  • 22.0 ap374145
  • 22.0 ap374162
  • 22.0 ap374165
  • 22.0 ap374211
  • 22.0 ap374226
  • 22.0 ap374249
  • 22.0 ap374255
  • 22.0 ap374270
  • 22.0 ap374286
  • 22.0 ap374294
  • 22.0 ap374296
  • 22.0 ap374305
  • 22.0 ap374310
  • 22.0 ap374311
  • 22.0 ap374315
  • 22.0 ap374361
  • 22.0 ap374414
  • 22.0 ap374421
  • 22.0 ap374454
  • 22.0 ap374472
  • 22.0 ap374493
  • 22.0 ap374498
  • 22.0 ap374528
  • 22.0 ap374530
  • 22.0 ap374548
  • 22.0 ap374583
  • 22.0 ap374605
  • 22.0 ap374609
  • 22.0 ap374641
  • 22.0 ap374643
  • 22.0 ap374691
  • 22.0 ap374695
  • 22.0 ap374723
  • 22.0 ap374785
  • 22.0 ap374793
  • 22.0 ap374794
  • 22.0 ap374820
  • 22.0 ap374832
  • 22.0 ap374869
  • 22.0 ap374892
  • 22.0 ap374917
  • 22.0 ap374935
  • 22.0 ap374943
  • 22.0 ap374956
  • 22.0 ap375004
  • 22.0 ap375021
  • 22.0 ap375036
  • 22.0 ap375039
  • 22.0 ap375041
  • 22.0 ap375205
  • 22.0 ap375207
  • 22.0 ap375210
  • 22.0 ap375214
  • 22.0 ap375240
  • 22.0 ap375260
  • 22.0 ap375270
  • 22.0 ap375273
  • 22.0 ap375289
  • 22.0 ap375293
  • 22.0 ap375317
  • 22.0 ap375335
  • 22.0 ap375342
  • 22.0 ap375351
  • 22.0 ap375353
  • 22.0 ap375370
  • 22.0 ap375398
  • 22.0 ap375409
  • 22.0 ap375412
  • 22.0 ap375414
  • 22.0 ap375421
  • 22.0 ap375424
  • 22.0 ap375425
  • 22.0 ap375430
  • 22.0 ap375432
  • 22.0 ap375453
  • 22.0 ap375469
  • 22.0 ap375484
  • 22.0 ap375488
  • 22.0 ap375489
  • 22.0 ap375514
  • 22.0 ap375515
  • 22.0 ap375518
  • 22.0 ap375539
  • 22.0 ap375603
  • 22.0 ap375624
  • 22.0 ap375650
  • 22.0 ap375700
  • 22.0 ap375711
  • 22.0 ap375748
  • 22.0 ap375756
  • 22.0 ap375757
  • 22.0 ap375785
  • 22.0 ap375787
  • 22.0 ap375804
  • 22.0 ap375828
  • 22.0 ap375849
  • 22.0 ap375860
  • 22.0 ap375902
  • 22.0 ap375950
  • 22.0 ap375959
  • 22.0 ap375982
  • 22.0 ap375989
  • 22.0 ap375996
  • 22.0 ap376012
  • 22.0 ap376024
  • 22.0 ap376042
  • 22.0 ap376099
  • 22.0 ap376156
  • 22.0 ap376189
  • 22.0 ap376205
  • 22.0 ap376213
  • 22.0 ap376220
  • 22.0 ap376317
  • 22.0 ap376373
  • 22.0 ap376384
  • 22.0 ap376387
  • 22.0 ap376414
  • 22.0 ap376445
  • 22.0 ap376486
  • 22.0 ap376512
  • 22.0 ap376529
  • 22.0 ap376594
  • 22.0 ap376613
  • 22.0 ap376622
  • 22.0 ap376666
  • 22.0 ap376696
  • 22.0 ap376699
  • 22.0 ap376704
  • 22.0 ap376722
  • 22.0 ap376736
  • 22.0 ap376787
  • 22.0 ap376798
  • 22.0 ap376809
  • 22.0 ap376818
  • 22.0 ap376820
  • 22.0 ap376878
  • 22.0 ap376889
  • 22.0 ap376934
  • 22.0 ap376945
  • 22.0 ap376956
  • 22.0 ap376979
  • 22.0 ap377033
  • 22.0 ap377050
  • 22.0 ap377091
  • 22.0 ap377109
  • 22.0 ap377120
  • 22.0 ap377163
  • 22.0 ap377175
  • 22.0 ap377177
  • 22.0 ap377229
  • 22.0 ap377319
  • 22.0 ap377423
  • 22.0 ap377505
  • 22.0 ap377517
  • 22.0 ap377538
  • 22.0 ap377555
  • 22.0 ap377569
  • 22.0 ap377630
  • 22.0 ap377670
  • 22.0 ap377687
  • 22.0 ap377718
  • 22.0 ap377723
  • 22.0 ap377737
  • 22.0 ap377751
  • 22.0 ap377868
  • 22.0 ap377878
  • 22.0 ap377888
  • 22.0 ap377966
  • 22.0 ap377986
  • 22.0 ap378014
  • 22.0 ap378029
  • 22.0 ap378047
  • 22.0 ap378051
  • 22.0 ap378070
  • 22.0 ap378087
  • 22.0 ap378122
  • 22.0 ap378141
  • 22.0 ap378142
  • 22.0 ap378144
  • 22.0 ap378154
  • 22.0 ap378168
  • 22.0 ap378178
  • 22.0 ap378227
  • 22.0 ap378234
  • 22.0 ap378242
  • 22.0 ap378248
  • 22.0 ap378258
  • 22.0 ap378372
  • 22.0 ap378383
  • 22.0 ap378390
  • 22.0 ap378415
  • 22.0 ap378481
  • 22.0 ap378535
  • 22.0 ap378553
  • 22.0 ap378575
  • 22.0 ap378595
  • 22.0 ap378818
  • 22.0 ap378827
  • 22.0 ap378886
  • 22.0 ap378902
  • 22.0 ap378913
  • 22.0 ap378920
  • 22.0 ap378952
  • 22.0 ap378985
  • 22.0 ap378991
  • 22.0 ap378995
  • 22.0 ap379091
  • 22.0 ap379105
  • 22.0 ap379112
  • 22.0 ap379140
  • 22.0 ap379152
  • 22.0 ap379168
  • 22.0 ap379187
  • 22.0 ap379190
  • 22.0 ap379327
  • 22.0 ap379339
  • 22.0 ap379346
  • 22.0 ap379373
  • 22.0 ap379390
  • 22.0 ap379391
  • 22.0 ap379411
  • 22.0 ap379423
  • 22.0 ap379449
  • 22.0 ap379501
  • 22.0 ap379511
  • 22.0 ap379532
  • 22.0 ap379533
  • 22.0 ap379535
  • 22.0 ap379600
  • 22.0 ap379616
  • 22.0 ap379627
  • 22.0 ap379635
  • 22.0 ap379781
  • 22.0 ap379830
  • 22.0 ap379855
  • 22.0 ap379903
  • 22.0 ap379921
  • 22.0 ap379925
  • 22.0 ap379957
  • 22.0 ap379963
  • 22.0 ap380109
  • 22.0 ap380249
  • 22.0 ap380256
  • 22.0 ap380264
  • 22.0 ap380282
  • 22.0 ap380355
  • 22.0 ap380375
  • 22.0 ap380465
  • 22.0 ap380581
  • 22.0 ap380608
  • 22.0 ap380692
  • 22.0 ap380758
  • 22.0 ap380762
  • 22.0 ap380766
  • 22.0 ap380772
  • 22.0 ap380775
  • 22.0 ap380782
  • 22.0 ap380802
  • 22.0 ap380840
  • 22.0 ap380939
  • 22.0 ap381051
  • 22.0 ap381078
  • 22.0 ap381081
  • 22.0 ap381108
  • 22.0 ap381247
  • 22.0 ap381269
  • 22.0 ap381292
  • 22.0 ap381300
  • 22.0 ap381334
  • 22.0 ap381339
  • 22.0 ap381358
  • 22.0 ap381385
  • 22.0 ap381398
  • 22.0 ap381543
  • 22.0 ap381570
  • 22.0 ap381575
  • 22.0 ap381596
  • 22.0 ap381600
  • 22.0 ap381611
  • 22.0 ap381616
  • 22.0 ap381621
  • 22.0 ap381623
  • 22.0 ap381624
  • 22.0 ap381657
  • 22.0 ap381734
  • 22.0 ap381775
  • 22.0 ap381809
  • 22.0 ap381825
  • 22.0 ap381878
  • 22.0 ap382231
  • 22.0 ap382412
  • 22.0 ap382441
  • 22.0 ap382691
  • 22.0 ap382692
  • 22.0 ap382836
  • 22.0 ap382869
  • 22.0 ap382873
  • 22.0 ap382894
  • 22.0 ap382929
  • 22.0 ap382935
  • 22.0 ap382965
  • 22.0 ap382969
  • 22.0 ap382994
  • 22.0 ap383105
  • 22.0 ap383126
  • 22.0 ap383147
  • 22.0 ap383178
  • 22.0 ap383188
  • 22.0 ap383331
  • 22.0 ap383682
  • RI.2021.02
  • RI.2021.08
  • RI.2021.09
  • RI.2021.10
  • RI.2021.11
  • RI.2021.12
  • RI.2022.02
  • RI.2022.03
  • RI.2022.04
  • RI.2022.07
  • RI.2022.06
  • RI.2022.05
  • RI.2022.09
  • RI.2022.12
Problem Types
TypeCWE IDDescription
cweCWE-918Server-Side Request Forgery (SSRF)
Type: cwe
CWE ID: CWE-918
Description: Server-Side Request Forgery (SSRF)
Metrics
VersionBase scoreBase severityVector
3.17.7HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Version: 3.1
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp
x_transferred
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ykramarz@cisco.com
Published At:04 Nov, 2022 | 18:15
Updated At:25 Jan, 2024 | 17:15

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Secondary3.17.7HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>broadworks_messaging_server>>Versions before 23.0(exclusive)
cpe:2.3:a:cisco:broadworks_messaging_server:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-918Primarynvd@nist.gov
CWE-918Secondaryykramarz@cisco.com
CWE ID: CWE-918
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-918
Type: Secondary
Source: ykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfppykramarz@cisco.com
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp
Source: ykramarz@cisco.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

197Records found

CVE-2025-0474
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-7.7||HIGH
EPSS-0.07% / 22.39%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 18:50
Updated-12 Feb, 2025 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Invoice Ninja PDF Rendering Server Side Request Forgery

Invoice Ninja is vulnerable to authenticated Server-Side Request Forgery (SSRF) allowing for arbitrary file read and network resource requests as the application user. This issue affects Invoice Ninja: from 5.8.56 through 5.11.23.

Action-Not Available
Vendor-Invoice Ninja
Product-Invoice Ninja
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-28463
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-6.5||MEDIUM
EPSS-0.67% / 70.43%
||
7 Day CHG~0.00%
Published-18 Feb, 2021 | 16:00
Updated-17 Sep, 2024 | 01:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-side Request Forgery (SSRF)

All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF

Action-Not Available
Vendor-reportlabn/aFedora Project
Product-fedorareportlabreportlab
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-28943
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 43.73%
||
7 Day CHG~0.00%
Published-30 Apr, 2021 | 21:03
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OX App Suite 7.10.4 and earlier allows SSRF via a snippet.

Action-Not Available
Vendor-n/aOpen-Xchange AG
Product-open-xchange_appsuiten/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-25353
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 15.83%
||
7 Day CHG~0.00%
Published-20 Aug, 2021 | 18:10
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A server-side request forgery (SSRF) vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability allowed remote authenticated attackers to open a connection to the machine via the deviceIpAddr and connPort parameters.

Action-Not Available
Vendor-rconfign/a
Product-rconfign/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-24815
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-7.54% / 91.43%
||
7 Day CHG~0.00%
Published-24 Nov, 2020 | 16:48
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Server-Side Request Forgery (SSRF) affecting the PDF generation in MicroStrategy 10.4, 2019 before Update 6, and 2020 before Update 2 allows authenticated users to access the content of internal network resources or leak files from the local system via HTML containers embedded in a dossier/dashboard document. NOTE: 10.4., no fix will be released as version will reach end-of-life on 31/12/2020.

Action-Not Available
Vendor-microstrategyn/a
Product-microstrategyn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-24898
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.6||HIGH
EPSS-0.22% / 44.39%
||
7 Day CHG~0.00%
Published-29 Aug, 2020 | 19:57
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Table Filter and Charts for Confluence Server app before 5.3.26 (for Atlassian Confluence) allows SSRF via the "Table from CSV" macro (URL parameter).

Action-Not Available
Vendor-stiltsoftn/a
Product-table_filter_and_charts_for_confluence_servern/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-25820
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-3.95% / 87.88%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 13:01
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BigBlueButton before 2.2.7 allows remote authenticated users to read local files and conduct SSRF attacks via an uploaded Office document that has a crafted URL in an ODF xlink field.

Action-Not Available
Vendor-bigbluebuttonn/a
Product-bigbluebuttonn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-39854
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 19.74%
||
7 Day CHG~0.00%
Published-09 Oct, 2023 | 00:00
Updated-19 Sep, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interface of ATX Ucrypt through 3.5 allows authenticated users (or attackers using default credentials for the admin, master, or user account) to include files via a URL in the /hydra/view/get_cc_url url parameter. There can be resultant SSRF.

Action-Not Available
Vendor-atxn/a
Product-ucryptn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-39313
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-7.7||HIGH
EPSS-0.44% / 62.16%
||
7 Day CHG~0.00%
Published-28 Mar, 2024 | 05:56
Updated-05 Feb, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Avada theme <= 7.11.1 - Authenticated Server Side Request Forgery (SSRF) vulnerability

Server-Side Request Forgery (SSRF) vulnerability in ThemeFusion Avada.This issue affects Avada: from n/a through 7.11.1.

Action-Not Available
Vendor-Avada (ThemeFusion)
Product-avadaAvada
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2019-6257
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.7||HIGH
EPSS-0.21% / 43.10%
||
7 Day CHG~0.00%
Published-14 Jan, 2019 | 07:00
Updated-16 Sep, 2024 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Server Side Request Forgery (SSRF) vulnerability in elFinder before 2.1.46 could allow a malicious user to access the content of internal network resources. This occurs in get_remote_contents() in php/elFinder.class.php.

Action-Not Available
Vendor-std42n/a
Product-elfindern/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-26494
Matching Score-4
Assigner-Salesforce, Inc.
ShareView Details
Matching Score-4
Assigner-Salesforce, Inc.
CVSS Score-7.7||HIGH
EPSS-0.07% / 22.74%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 17:33
Updated-19 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server Side Request Forgery vulnerability in Tableau Server

Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server allows Authentication Bypass.This issue affects Tableau Server: from 2023.3 through 2023.3.5.

Action-Not Available
Vendor-Salesforce
Product-Tableau Server
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-36679
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-7.1||HIGH
EPSS-0.27% / 50.34%
||
7 Day CHG~0.00%
Published-28 Mar, 2024 | 05:58
Updated-05 Mar, 2025 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Spectra plugin <= 2.6.6 - Server Side Request Forgery (SSRF) vulnerability

Server-Side Request Forgery (SSRF) vulnerability in Brainstorm Force Spectra.This issue affects Spectra: from n/a through 2.6.6.

Action-Not Available
Vendor-Brainstorm Force
Product-spectraSpectra
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-25297
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-0.07% / 23.16%
||
7 Day CHG-0.00%
Published-14 Feb, 2025 | 19:25
Updated-25 Aug, 2025 | 01:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Label Studio allows Server-Side Request Forgery in the S3 Storage Endpoint

Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's S3 storage integration feature contains a Server-Side Request Forgery (SSRF) vulnerability in its endpoint configuration. When creating an S3 storage connection, the application allows users to specify a custom S3 endpoint URL via the s3_endpoint parameter. This endpoint URL is passed directly to the boto3 AWS SDK without proper validation or restrictions on the protocol or destination. The vulnerability allows an attacker to make the application send HTTP requests to arbitrary internal services by specifying them as the S3 endpoint. When the storage sync operation is triggered, the application attempts to make S3 API calls to the specified endpoint, effectively making HTTP requests to the target service and returning the response in error messages. This SSRF vulnerability enables attackers to bypass network segmentation and access internal services that should not be accessible from the external network. The vulnerability is particularly severe because error messages from failed requests contain the full response body, allowing data exfiltration from internal services. Version 1.16.0 contains a patch for the issue.

Action-Not Available
Vendor-humansignalHumanSignal
Product-label_studiolabel-studio
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-21385
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-48.60% / 97.67%
||
7 Day CHG~0.00%
Published-09 Jan, 2025 | 22:07
Updated-02 Apr, 2025 | 13:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Purview Information Disclosure Vulnerability

A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-purviewMicrosoft Purview
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2019-15033
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.7||HIGH
EPSS-0.33% / 54.93%
||
7 Day CHG~0.00%
Published-19 Sep, 2019 | 16:12
Updated-05 Aug, 2024 | 00:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pydio 6.0.8 allows Authenticated SSRF during a Remote Link Feature download. An attacker can specify an intranet address in the file parameter to index.php, when sending a file to a remote server, as demonstrated by the file=http%3A%2F%2F192.168.1.2 substring.

Action-Not Available
Vendor-pydion/a
Product-pydion/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2019-14476
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.22% / 44.87%
||
7 Day CHG~0.00%
Published-16 Dec, 2020 | 16:50
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AdRem NetCrunch 10.6.0.4587 has a Server-Side Request Forgery (SSRF) vulnerability in the NetCrunch server. Every user can trick the server into performing SMB requests to other systems.

Action-Not Available
Vendor-adremsoftn/a
Product-netcrunchn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-2756
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.1||HIGH
EPSS-66.50% / 98.47%
||
7 Day CHG~0.00%
Published-10 Aug, 2022 | 15:15
Updated-03 Aug, 2024 | 00:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) in kareadita/kavita

Server-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1.

Action-Not Available
Vendor-kavitareaderkareadita
Product-kavitakareadita/kavita
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-27234
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.13% / 33.76%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Server-side request forgery in the CVAT software maintained by Intel(R) before version 2.0.1 may allow an authenticated user to potentially enable information disclosure via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-computer_vision_annotation_toolCVAT software maintained by Intel(R)
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-8635
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-7.7||HIGH
EPSS-0.04% / 12.13%
||
7 Day CHG~0.00%
Published-12 Sep, 2024 | 17:01
Updated-14 Sep, 2024 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) in GitLab

A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possible for an attacker to make requests to internal resources using a custom Maven Dependency Proxy URL

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-7959
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.7||HIGH
EPSS-0.07% / 21.65%
||
7 Day CHG+0.01%
Published-20 Mar, 2025 | 10:09
Updated-21 Jul, 2025 | 20:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SSRF in open-webui/open-webui

The `/openai/models` endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and return the output. This vulnerability allows the attacker to access internal services and potentially gain command execution by accessing instance secrets.

Action-Not Available
Vendor-openwebuiopen-webui
Product-open_webuiopen-webui/open-webui
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-45290
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.7||HIGH
EPSS-0.17% / 39.16%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 20:12
Updated-16 Oct, 2024 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path traversal and Server-Side Request Forgery when opening XLSX files in PHPSpreadsheet

PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. It's possible for an attacker to construct an XLSX file which links media from external URLs. When opening the XLSX file, PhpSpreadsheet retrieves the image size and type by reading the file contents, if the provided path is a URL. By using specially crafted `php://filter` URLs an attacker can leak the contents of any file or URL. Note that this vulnerability is different from GHSA-w9xv-qf98-ccq4, and resides in a different component. An attacker can access any file on the server, or leak information form arbitrary URLs, potentially exposing sensitive information such as AWS IAM credentials. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-PHPOffice
Product-phpspreadsheetPhpSpreadsheetphpspreadsheet
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CWE ID-CWE-36
Absolute Path Traversal
CVE-2024-56736
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 22.60%
||
7 Day CHG~0.00%
Published-16 Apr, 2025 | 15:38
Updated-17 Apr, 2025 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache HertzBeat: Server-Side Request Forgery (SSRF) in Api Config Oss

Server-Side Request Forgery (SSRF) vulnerability in Apache HertzBeat. This issue affects Apache HertzBeat (incubating): before 1.7.0. Users are recommended to upgrade to version 1.7.0, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-Apache HertzBeat
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-25609
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-4.2||MEDIUM
EPSS-0.16% / 37.17%
||
7 Day CHG~0.00%
Published-13 Jun, 2023 | 08:41
Updated-22 Oct, 2024 | 20:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A server-side request forgery (SSRF) vulnerability [CWE-918] in FortiManager and FortiAnalyzer GUI 7.2.0 through 7.2.1, 7.0.0 through 7.0.6, 6.4.8 through 6.4.11 may allow a remote and authenticated attacker to access unauthorized files and services on the system via specially crafted web requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortianalyzerfortimanagerFortiManagerFortiAnalyzer
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-4851
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.7||HIGH
EPSS-0.10% / 28.50%
||
7 Day CHG~0.00%
Published-06 Jun, 2024 | 18:39
Updated-17 Oct, 2024 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SSRF Vulnerability in stangirard/quivr

A Server-Side Request Forgery (SSRF) vulnerability exists in the stangirard/quivr application, version 0.0.204, which allows attackers to access internal networks. The vulnerability is present in the crawl endpoint where the 'url' parameter can be manipulated to send HTTP requests to arbitrary URLs, thereby facilitating SSRF attacks. The affected code is located in the backend/routes/crawl_routes.py file, specifically within the crawl_endpoint function. This issue could allow attackers to interact with internal services that are accessible from the server hosting the application.

Action-Not Available
Vendor-quivrstangirardquivr
Product-quivrstangirard/quivrquivr
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-48944
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 17.95%
||
7 Day CHG-0.01%
Published-27 Mar, 2025 | 15:05
Updated-08 May, 2025 | 10:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Kylin: SSRF vulnerability in the diagnosis api

Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. Through a kylin server, an attacker may forge a request to invoke "/kylin/api/xxx/diag" api on another internal host and possibly get leaked information. There are two preconditions: 1) The attacker has got admin access to a kylin server; 2) Another internal host has the "/kylin/api/xxx/diag" api endpoint open for service. This issue affects Apache Kylin: from 5.0.0 through 5.0.1. Users are recommended to upgrade to version 5.0.2, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-kylinApache Kylin
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-49521
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.7||HIGH
EPSS-0.15% / 35.73%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 16:41
Updated-18 Nov, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Adobe Commerce | Server-Side Request Forgery (SSRF) (CWE-918)

Adobe Commerce versions 3.2.5 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to a security feature bypass. A low privileged attacker could exploit this vulnerability to send crafted requests from the vulnerable server to internal systems, which could result in the bypassing of security measures such as firewalls. Exploitation of this issue does not require user interaction.

Action-Not Available
Vendor-Adobe Inc.
Product-magentocommerceAdobe Commerce
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-25777
Matching Score-4
Assigner-Mautic
ShareView Details
Matching Score-4
Assigner-Mautic
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 29.07%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 15:13
Updated-27 Feb, 2025 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery in Asset section

Prior to the patched version, an authenticated user of Mautic could read system files and access the internal addresses of the application due to a Server-Side Request Forgery (SSRF) vulnerability.

Action-Not Available
Vendor-acquiaMautic
Product-mauticMautic
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-43371
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.5||MEDIUM
EPSS-0.08% / 25.46%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 14:47
Updated-23 Aug, 2024 | 16:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential access to sensitive URLs via CKAN extensions (SSRF)

CKAN is an open-source data management system for powering data hubs and data portals. There are a number of CKAN plugins, including XLoader, DataPusher, Resource proxy and ckanext-archiver, that work by downloading the contents of local or remote files in order to perform some actions with their contents (e.g. pushing to the DataStore, streaming contents or saving a local copy). All of them use the resource URL, and there are currently no checks to limit what URLs can be requested. This means that a malicious (or unaware) user can create a resource with a URL pointing to a place where they should not have access in order for one of the previous tools to retrieve it (known as a Server Side Request Forgery). Users wanting to protect against these kinds of attacks can use one or a combination of the following approaches: (1) Use a separate HTTP proxy like Squid that can be used to allow / disallow IPs, domains etc as needed, and make CKAN extensions aware of this setting via the ckan.download_proxy config option. (2) Implement custom firewall rules to prevent access to restricted resources. (3) Use custom validators on the resource url field to block/allow certain domains or IPs. All latest versions of the plugins listed above support the ckan.download_proxy settings. Support for this setting in the Resource Proxy plugin was included in CKAN 2.10.5 and 2.11.0.

Action-Not Available
Vendor-okfnckan
Product-ckanckan
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2018-19571
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.7||HIGH
EPSS-29.17% / 96.41%
||
7 Day CHG~0.00%
Published-10 Jul, 2019 | 16:01
Updated-05 Aug, 2024 | 11:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GitLab CE/EE, versions 8.18 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an SSRF vulnerability in webhooks.

Action-Not Available
Vendor-n/aGitLab Inc.
Product-gitlabn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-23071
Matching Score-4
Assigner-Mend
ShareView Details
Matching Score-4
Assigner-Mend
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 43.99%
||
7 Day CHG~0.00%
Published-19 Jun, 2022 | 10:15
Updated-17 Sep, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Recipes - SSRF on Import

In Recipes, versions 0.9.1 through 1.2.5 are vulnerable to Server Side Request Forgery (SSRF), in the “Import Recipe” functionality. When an attacker enters the localhost URL, a low privileged attacker can access/read the internal file system to access sensitive information.

Action-Not Available
Vendor-tandoorrecipes
Product-recipesrecipes
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-1522
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.1||HIGH
EPSS-0.15% / 36.16%
||
7 Day CHG+0.02%
Published-23 Apr, 2025 | 16:45
Updated-07 Aug, 2025 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PostHog database_schema Server-Side Request Forgery Information Disclosure Vulnerability

PostHog database_schema Server-Side Request Forgery Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PostHog. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of the database_schema method. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to disclose information in the context of the service account. Was ZDI-CAN-25358.

Action-Not Available
Vendor-posthogPostHog
Product-posthogPostHog
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-32750
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-2.26% / 83.95%
||
7 Day CHG~0.00%
Published-08 Jun, 2023 | 00:00
Updated-06 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pydio Cells through 4.1.2 allows SSRF. For longer running processes, Pydio Cells allows for the creation of jobs, which are run in the background. The job "remote-download" can be used to cause the backend to send a HTTP GET request to a specified URL and save the response to a new file. The response file is then available in a user-specified folder in Pydio Cells.

Action-Not Available
Vendor-pydion/a
Product-cellsn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-39383
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.08% / 23.86%
||
7 Day CHG~0.00%
Published-16 Nov, 2022 | 00:00
Updated-23 Apr, 2025 | 16:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SSRF vulnerability in KubeVela VelaUX APIServer

KubeVela is an open source application delivery platform. Users using the VelaUX APIServer could be affected by this vulnerability. When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability. Users who're using v1.6, please update the v1.6.1. Users who're using v1.5, please update the v1.5.8. There are no known workarounds for this issue.

Action-Not Available
Vendor-kubevelaThe Linux Foundation
Product-kubevelakubevela
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-41385
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 44.08%
||
7 Day CHG~0.00%
Published-27 Sep, 2021 | 05:49
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The third party intelligence connector in Securonix SNYPR 6.3.1 Build 184295_0302 allows an authenticated user to obtain access to server configuration details via SSRF.

Action-Not Available
Vendor-securonixn/a
Product-snyprn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-40186
Matching Score-4
Assigner-AppCheck Ltd.
ShareView Details
Matching Score-4
Assigner-AppCheck Ltd.
CVSS Score-6.5||MEDIUM
EPSS-0.29% / 52.37%
||
7 Day CHG~0.00%
Published-31 May, 2022 | 18:09
Updated-04 Aug, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNN CMS Server-Side Request Forgery (SSRF)

The AppCheck research team identified a Server-Side Request Forgery (SSRF) vulnerability within the DNN CMS platform, formerly known as DotNetNuke. SSRF vulnerabilities allow the attacker to exploit the target system to make network requests on their behalf, allowing a range of possible attacks. In the most common scenario, the attacker exploits SSRF vulnerabilities to attack systems behind the firewall and access sensitive information from Cloud Provider metadata services.

Action-Not Available
Vendor-ESW Operations, LLC ("DNN Software")
Product-dotnetnukeDNN Platform
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-37223
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.69% / 70.74%
||
7 Day CHG~0.00%
Published-05 Oct, 2021 | 11:59
Updated-04 Aug, 2024 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nagios Enterprises NagiosXI <= 5.8.4 contains a Server-Side Request Forgery (SSRF) vulnerability in schedulereport.php. Any authenticated user can create scheduled reports containing PDF screenshots of any view in the NagiosXI application. Due to lack of input sanitisation, the target page can be replaced with an SSRF payload to access internal resources or disclose local system files.

Action-Not Available
Vendor-n/aNagios Enterprises, LLC
Product-nagios_xin/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-33213
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 40.36%
||
7 Day CHG~0.00%
Published-14 Jul, 2021 | 13:40
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An SSRF vulnerability in the "Upload from URL" feature in Elements-IT HTTP Commander 5.3.3 allows remote authenticated users to retrieve HTTP and FTP files from the internal server network by inserting an internal address.

Action-Not Available
Vendor-element-itn/a
Product-http_commandern/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-24888
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.4||MEDIUM
EPSS-0.32% / 54.63%
||
7 Day CHG+0.08%
Published-02 Apr, 2024 | 18:16
Updated-07 Feb, 2025 | 16:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Gutenberg Blocks by Kadence Blocks plugin <= 3.2.25 - Server Side Request Forgery (SSRF) vulnerability

Server-Side Request Forgery (SSRF) vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks.This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.2.25.

Action-Not Available
Vendor-Kadence WP
Product-gutenberg_blocks_with_aiGutenberg Blocks by Kadence Blocks
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-23500
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-7.7||HIGH
EPSS-0.69% / 70.85%
||
7 Day CHG~0.00%
Published-28 Mar, 2024 | 05:54
Updated-07 Feb, 2025 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Kadence Blocks plugin <= 3.2.19 - Server Side Request Forgery (SSRF) vulnerability

Server-Side Request Forgery (SSRF) vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks.This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.2.19.

Action-Not Available
Vendor-Kadence WP
Product-gutenberg_blocks_with_aiGutenberg Blocks by Kadence Blocks
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-22134
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-4.9||MEDIUM
EPSS-0.15% / 35.64%
||
7 Day CHG~0.00%
Published-24 Jan, 2024 | 11:39
Updated-13 Nov, 2024 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Contact Form 7 Extension For Mailchimp Plugin <= 0.5.70 is vulnerable to Server Side Request Forgery (SSRF)

Server-Side Request Forgery (SSRF) vulnerability in Renzo Johnson Contact Form 7 Extension For Mailchimp.This issue affects Contact Form 7 Extension For Mailchimp: from n/a through 0.5.70.

Action-Not Available
Vendor-renzojohnsonRenzo Johnson
Product-contact_form_7_extension_for_mailchimpContact Form 7 Extension For Mailchimp
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-5526
Matching Score-4
Assigner-Grafana Labs
ShareView Details
Matching Score-4
Assigner-Grafana Labs
CVSS Score-7.7||HIGH
EPSS-0.21% / 43.96%
||
7 Day CHG~0.00%
Published-05 Jun, 2024 | 11:21
Updated-01 Aug, 2024 | 21:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Grafana OnCall is an easy-to-use on-call management tool that will help reduce toil in on-call management through simpler workflows and interfaces that are tailored specifically for engineers. Grafana OnCall, from version 1.1.37 before 1.5.2 are vulnerable to a Server Side Request Forgery (SSRF) vulnerability in the webhook functionallity. This issue was fixed in version 1.5.2

Action-Not Available
Vendor-Grafana Labs
Product-oncallOnCalloncall
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-51408
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.5||HIGH
EPSS-0.10% / 28.96%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 00:00
Updated-06 Nov, 2024 | 22:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AppSmith Community 1.8.3 before 1.46 allows SSRF via New DataSource for application/json requests to 169.254.169.254 to retrieve AWS metadata credentials.

Action-Not Available
Vendor-appsmithn/aappsmith
Product-appsmithn/aappsmith
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-5014
Matching Score-4
Assigner-Progress Software Corporation
ShareView Details
Matching Score-4
Assigner-Progress Software Corporation
CVSS Score-7.1||HIGH
EPSS-0.10% / 27.78%
||
7 Day CHG~0.00%
Published-25 Jun, 2024 | 20:13
Updated-21 Aug, 2024 | 13:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WhatsUp Gold GetASPReport Server-Side Request Forgery Information Disclosure

In WhatsUp Gold versions released before 2023.1.3, a Server Side Request Forgery vulnerability exists in the GetASPReport feature. This allows any authenticated user to retrieve ASP reports from an HTML form.

Action-Not Available
Vendor-Progress Software Corporation
Product-whatsup_goldWhatsUp Goldwhatsup_gold
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-29942
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.19% / 40.76%
||
7 Day CHG~0.00%
Published-04 May, 2022 | 17:26
Updated-03 Aug, 2024 | 06:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Talend Administration Center has a vulnerability that allows an authenticated user to use the Service Registry 'Add' functionality to perform SSRF HTTP GET requests on URLs in the internal network. The issue is fixed for versions 8.0.x in TPS-5189, versions 7.3.x in TPS-5175, and versions 7.2.x in TPS-5201. Earlier versions of Talend Administration Center may also be impacted; users are encouraged to update to a supported version.

Action-Not Available
Vendor-talendn/a
Product-administration_centern/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-3204
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.23% / 45.29%
||
7 Day CHG~0.00%
Published-19 Feb, 2021 | 13:25
Updated-03 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SSRF in the document conversion component of Webware Webdesktop 5.1.15 allows an attacker to read all files from the server.

Action-Not Available
Vendor-webwaren/a
Product-webdesktopn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-48052
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.11% / 29.76%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 00:00
Updated-13 Jun, 2025 | 00:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gradio <=4.42.0, the gr.DownloadButton function has a hidden server-side request forgery (SSRF) vulnerability. The reason is that within the save_url_to_cache function, there are no restrictions on the URL, which allows access to local target resources. This can lead to the download of local resources and sensitive information.

Action-Not Available
Vendor-gradio_projectn/agradio_project
Product-gradion/agradio
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-20480
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.34% / 56.04%
||
7 Day CHG~0.00%
Published-08 Apr, 2021 | 12:20
Updated-16 Sep, 2024 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM WebSphere Application Server 7.0, 8.0, and 8.5 is vulnerable to server-side request forgery (SSRF). By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to obtain sensitive data. IBM X-Force ID: 197502.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.IBM CorporationLinux Kernel Organization, IncOracle Corporation
Product-solarislinux_kernelwebsphere_application_serverihp-uxwindowsz\/osaixWebSphere Application Server
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found