Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-20204

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-03 Aug, 2023 | 21:15
Updated At-21 Nov, 2024 | 21:41
Rejected At-
Credits

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot Application Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:03 Aug, 2023 | 21:15
Updated At:21 Nov, 2024 | 21:41
Rejected At:
▼CVE Numbering Authority (CNA)

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot Application Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco BroadWorks
Versions
Affected
  • 24.0 ap375672
  • 24.0 ap375655
  • 24.0 ap376979
  • 24.0 ap379112
  • 24.0 ap379588
  • 24.0 ap378485
  • 24.0 ap376934
  • 24.0 ap379533
  • 24.0 ap374230
  • 24.0 ap378382
  • 24.0 ap375720
  • 24.0 ap378575
  • 24.0 ap378248
  • 24.0 ap378990
  • 24.0 ap378425
  • 24.0 ap377319
  • 24.0 ap378818
  • 24.0 ap375453
  • 24.0 ap376317
  • 24.0 ap376677
  • 24.0 ap375688
  • 24.0 ap377147
  • 24.0 ap376945
  • 24.0 ap377517
  • 24.0 ap376205
  • 24.0 ap378257
  • 24.0 ap378471
  • 24.0 ap376669
  • 24.0 ap375756
  • 24.0 ap378440
  • 24.0 ap376486
  • 24.0 ap378920
  • 24.0 ap375734
  • 24.0 ap378144
  • 24.0 ap375036
  • 24.0 ap375624
  • 24.0 ap378882
  • 24.0 ap376531
  • 24.0 ap375804
  • 24.0 ap376137
  • 24.0 ap377378
  • 24.0 ap376844
  • 24.0 ap376696
  • 24.0 ap378599
  • 24.0 ap378880
  • 24.0 ap374530
  • 24.0 ap375369
  • 24.0 ap376147
  • 24.0 ap376140
  • 24.0 ap379501
  • 24.0 ap378150
  • 24.0 ap375100
  • 24.0 ap376622
  • 24.0 ap379339
  • 24.0 ap377163
  • 24.0 ap375464
  • 24.0 ap376023
  • 24.0 ap378164
  • 24.0 ap378154
  • 24.0 ap377068
  • 24.0 ap377177
  • 24.0 ap377091
  • 24.0 ap377515
  • 24.0 ap379190
  • 24.0 ap378595
  • 24.0 ap374832
  • 24.0 ap367206
  • 24.0 ap377868
  • 24.0 ap378902
  • 24.0 ap375210
  • 24.0 ap375353
  • 24.0 ap376098
  • 24.0 ap378383
  • 24.0 ap379122
  • 24.0 ap376710
  • 24.0 ap376602
  • 24.0 ap378535
  • 24.0 ap377729
  • 24.0 ap375990
  • 24.0 ap375748
  • 24.0 ap376935
  • 24.0 ap376426
  • 24.0 ap375743
  • 24.0 ap379109
  • 24.0 ap378080
  • 24.0 ap375449
  • 24.0 ap375922
  • 24.0 ap377984
  • 24.0 ap379391
  • 24.0 ap379378
  • 24.0 ap376512
  • 24.0 ap376956
  • 24.0 ap369855
  • 24.0 ap379098
  • 24.0 ap376736
  • 24.0 ap377674
  • 24.0 ap375625
  • 24.0 ap378393
  • 24.0 ap376620
  • 24.0 ap372799
  • 24.0 ap378976
  • 24.0 ap376989
  • 24.0 ap378862
  • 24.0 ap378242
  • 24.0 ap375489
  • 24.0 ap379475
  • 24.0 ap376820
  • 24.0 ap375533
  • 24.0 ap376308
  • 24.0 ap376798
  • 24.0 ap375661
  • 24.0 ap378953
  • 24.0 ap371233
  • 24.0 ap377628
  • 24.0 ap375266
  • 24.0 ap376984
  • 24.0 ap375021
  • 24.0 ap377966
  • 24.0 ap375484
  • 24.0 ap378436
  • 24.0 ap378886
  • 24.0 ap375709
  • 24.0 ap376267
  • 24.0 ap375514
  • 24.0 ap377743
  • 24.0 ap377878
  • 24.0 ap378308
  • 24.0 ap379487
  • 24.0 ap376038
  • 24.0 ap377802
  • 24.0 ap376507
  • 24.0 ap377630
  • 24.0 ap378913
  • 24.0 ap376252
  • 24.0 ap376407
  • 24.0 ap376410
  • 24.0 ap376523
  • 24.0 ap375342
  • 24.0 ap375304
  • 24.0 ap378553
  • 24.0 ap375205
  • 24.0 ap376889
  • 24.0 ap376529
  • 24.0 ap375214
  • 24.0 ap377888
  • 24.0 ap377913
  • 24.0 ap376024
  • 24.0 ap378390
  • 24.0 ap375382
  • 24.0 ap379395
  • 24.0 ap377120
  • 24.0 ap378400
  • 24.0 ap376878
  • 24.0 ap377723
  • 24.0 ap374691
  • 24.0 ap379346
  • 24.0 ap378218
  • 24.0 ap376842
  • 24.0 ap374270
  • 24.0 ap376000
  • 24.0 ap376702
  • 24.0 ap377497
  • 24.0 ap375018
  • 24.0 ap378506
  • 24.0 ap377412
  • 24.0 ap375959
  • 24.0 ap379016
  • 24.0 ap379438
  • 24.0 ap378995
  • 24.0 ap378258
  • 24.0 ap378574
  • 24.0 ap375711
  • 24.0 ap376809
  • 24.0 ap375634
  • 24.0 ap375646
  • 24.0 ap375488
  • 24.0 ap377555
  • 24.0 ap375293
  • 24.0 ap378322
  • 24.0 ap378029
  • 24.0 ap379373
  • 24.0 ap377737
  • 24.0 ap378010
  • 24.0 ap378481
  • 24.0 ap376721
  • 24.0 ap375860
  • 24.0 ap378332
  • 24.0 ap379389
  • 24.0 ap377983
  • 24.0 ap378866
  • 24.0 ap377399
  • 24.0 ap376722
  • 24.0 ap379474
  • 24.0 ap378070
  • 24.0 ap376670
  • 24.0 ap375207
  • 24.0 ap376100
  • 24.0 ap378122
  • 24.0 ap376012
  • 24.0 ap375828
  • 24.0 ap378827
  • 24.0 ap376787
  • 24.0 ap376414
  • 24.0 ap377786
  • 24.0 ap376485
  • 24.0 ap379069
  • 24.0 ap378863
  • 24.0 ap376298
  • 24.0 ap373564
  • 24.0 ap376429
  • 24.0 ap379449
  • 24.0 ap377485
  • 24.0 ap378051
  • 24.0 ap375849
  • 24.0 ap376099
  • 24.0 ap378234
  • 24.0 ap377033
  • 24.0 ap377079
  • 24.0 ap375950
  • 24.0 ap375412
  • 24.0 ap375757
  • 24.0 ap376762
  • 24.0 ap376445
  • 24.0 ap379515
  • 24.0 ap375351
  • 24.0 ap375273
  • 24.0 ap378896
  • 24.0 ap379199
  • 24.0 ap374803
  • 24.0 ap375685
  • 24.0 ap375270
  • 24.0 ap370326
  • 24.0 ap375603
  • 24.0 ap376802
  • 24.0 ap376704
  • 24.0 ap379423
  • 24.0 ap376001
  • 24.0 ap377508
  • 24.0 ap375989
  • 24.0 ap376699
  • 24.0 ap377012
  • 24.0 ap379532
  • 24.0 ap378141
  • 24.0 ap375949
  • 24.0 ap375996
  • 24.0 ap378087
  • 24.0 ap378178
  • 24.0 ap375862
  • 24.0 ap376042
  • 24.0 ap378079
  • 24.0 ap379390
  • 24.0 ap378970
  • 24.0 ap375908
  • 24.0 ap378019
  • 24.0 ap377329
  • 24.0 ap376356
  • 24.0 ap377908
  • 24.0 ap377751
  • 24.0 ap377581
  • 24.0 ap375902
  • 24.0
  • 24.0 ap356141
  • 24.0 ap358290
  • 24.0 ap362693
  • 24.0 ap370935
  • 24.0 ap372508
  • 24.0 ap372932
  • 24.0 ap375289
  • 24.0 ap375291
  • 24.0 ap375317
  • 24.0 ap375370
  • 24.0 ap375398
  • 24.0 ap375409
  • 24.0 ap375430
  • 24.0 ap375432
  • 24.0 ap375465
  • 24.0 ap375466
  • 24.0 ap375469
  • 24.0 ap375502
  • 24.0 ap375518
  • 24.0 ap375522
  • 24.0 ap375539
  • 24.0 ap375785
  • 24.0 ap375920
  • 24.0 ap376156
  • 24.0 ap376189
  • 24.0 ap376213
  • 24.0 ap376218
  • 24.0 ap376340
  • 24.0 ap376384
  • 24.0 ap376541
  • 24.0 ap376652
  • 24.0 ap376666
  • 24.0 ap376668
  • 24.0 ap376682
  • 24.0 ap376689
  • 24.0 ap376695
  • 24.0 ap376752
  • 24.0 ap376818
  • 24.0 ap376873
  • 24.0 ap377023
  • 24.0 ap377037
  • 24.0 ap377050
  • 24.0 ap377175
  • 24.0 ap377229
  • 24.0 ap377384
  • 24.0 ap377423
  • 24.0 ap377496
  • 24.0 ap377516
  • 24.0 ap377538
  • 24.0 ap377569
  • 24.0 ap377651
  • 24.0 ap377687
  • 24.0 ap377718
  • 24.0 ap377727
  • 24.0 ap377757
  • 24.0 ap377779
  • 24.0 ap377792
  • 24.0 ap377799
  • 24.0 ap378014
  • 24.0 ap378119
  • 24.0 ap378140
  • 24.0 ap378142
  • 24.0 ap378153
  • 24.0 ap378165
  • 24.0 ap378168
  • 24.0 ap378227
  • 24.0 ap378259
  • 24.0 ap378372
  • 24.0 ap378415
  • 24.0 ap378419
  • 24.0 ap378437
  • 24.0 ap378509
  • 24.0 ap378545
  • 24.0 ap378581
  • 24.0 ap378585
  • 24.0 ap378823
  • 24.0 ap378904
  • 24.0 ap378952
  • 24.0 ap378966
  • 24.0 ap378987
  • 24.0 ap379080
  • 24.0 ap379085
  • 24.0 ap379091
  • 24.0 ap379140
  • 24.0 ap379152
  • 24.0 ap379167
  • 24.0 ap379168
  • 24.0 ap379187
  • 24.0 ap379331
  • 24.0 ap379411
  • 24.0 ap379427
  • 24.0 ap379482
  • 24.0 ap379531
  • 24.0 ap379535
  • 24.0 ap379565
  • 24.0 ap379587
  • 24.0 ap379600
  • 24.0 ap379606
  • 24.0 ap379608
  • 24.0 ap379611
  • 24.0 ap379616
  • 24.0 ap379627
  • 24.0 ap379635
  • 24.0 ap379694
  • 24.0 ap379701
  • 24.0 ap379752
  • 24.0 ap379760
  • 24.0 ap379762
  • 24.0 ap379764
  • 24.0 ap379780
  • 24.0 ap379781
  • 24.0 ap379782
  • 24.0 ap379830
  • 24.0 ap379839
  • 24.0 ap379848
  • 24.0 ap379855
  • 24.0 ap379874
  • 24.0 ap379884
  • 24.0 ap379889
  • 24.0 ap379892
  • 24.0 ap379903
  • 24.0 ap378203
  • 24.0 ap379008
  • 24.0 ap379795
  • 24.0 ap379838
  • 24.0 ap379847
  • 24.0 ap379890
  • 24.0 ap379921
  • 24.0 ap379925
  • 24.0 ap379934
  • 24.0 ap379957
  • 24.0 ap379963
  • 24.0 ap379972
  • 24.0 ap380059
  • 24.0 ap380099
  • 24.0 ap380109
  • 24.0 ap380137
  • 24.0 ap380143
  • 24.0 ap380161
  • 24.0 ap380176
  • 24.0 ap380180
  • 24.0 ap380181
  • 24.0 ap380187
  • 24.0 ap380196
  • 24.0 ap380204
  • 24.0 ap380239
  • 24.0 ap380249
  • 24.0 ap380256
  • 24.0 ap380264
  • 24.0 ap380269
  • 24.0 ap380270
  • 24.0 ap380281
  • 24.0 ap380282
  • 24.0 ap380355
  • 24.0 ap380371
  • 24.0 ap380375
  • 24.0 ap380396
  • 24.0 ap380450
  • 24.0 ap380465
  • 24.0 ap380473
  • 24.0 ap380501
  • 24.0 ap380506
  • 24.0 ap380543
  • 24.0 ap380581
  • 24.0 ap380595
  • 24.0 ap380637
  • 24.0 ap380692
  • 24.0 ap380758
  • 24.0 ap380762
  • 24.0 ap380766
  • 24.0 ap381358
  • 24.0 ap382200
  • 24.0 ap381767
  • 24.0 ap382744
  • 24.0 ap381657
  • 24.0 ap381609
  • 24.0 ap382951
  • 24.0 ap381848
  • 24.0 ap380849
  • 24.0 ap381809
  • 24.0 ap381826
  • 24.0 ap381622
  • 24.0 ap381654
  • 24.0 ap374211
  • 24.0 ap381002
  • 24.0 ap382750
  • 24.0 ap382039
  • 24.0 ap381874
  • 24.0 ap383534
  • 24.0 ap381775
  • 24.0 ap382916
  • 24.0 ap380939
  • 24.0 ap383002
  • 24.0 ap382206
  • 24.0 ap381247
  • 24.0 ap381666
  • 24.0 ap381825
  • 24.0 ap381952
  • 24.0 ap382277
  • 24.0 ap380936
  • 24.0 ap380985
  • 24.0 ap382468
  • 24.0 ap382094
  • 24.0 ap381971
  • 24.0 ap383536
  • 24.0 ap381970
  • 24.0 ap381271
  • 24.0 ap381292
  • 24.0 ap381621
  • 24.0 ap379049
  • 24.0 ap380840
  • 24.0 ap381600
  • 24.0 ap382526
  • 24.0 ap382462
  • 24.0 ap380613
  • 24.0 ap381596
  • 24.0 ap380779
  • 24.0 ap382615
  • 24.0 ap382170
  • 24.0 ap382164
  • 24.0 ap382189
  • 24.0 ap381357
  • 24.0 ap381348
  • 24.0 ap382495
  • 24.0 ap382042
  • 24.0 ap382441
  • 24.0 ap381575
  • 24.0 ap381936
  • 24.0 ap382994
  • 24.0 ap381623
  • 24.0 ap382236
  • 24.0 ap382676
  • 24.0 ap382673
  • 24.0 ap380998
  • 24.0 ap382045
  • 24.0 ap382167
  • 24.0 ap381975
  • 24.0 ap382668
  • 24.0 ap382053
  • 24.0 ap383710
  • 24.0 ap382740
  • 24.0 ap383459
  • 24.0 ap382692
  • 24.0 ap383737
  • 24.0 ap380045
  • 24.0 ap382195
  • 24.0 ap382057
  • 24.0 ap381243
  • 24.0 ap382160
  • 24.0 ap382445
  • 24.0 ap382246
  • 24.0 ap382958
  • 24.0 ap381854
  • 24.0 ap381604
  • 24.0 ap381091
  • 24.0 ap381079
  • 24.0 ap381527
  • 24.0 ap383772
  • 24.0 ap381004
  • 24.0 ap380737
  • 24.0 ap382253
  • 24.0 ap381721
  • 24.0 ap381322
  • 24.0 ap382098
  • 24.0 ap382677
  • 24.0 ap382169
  • 24.0 ap383696
  • 24.0 ap382258
  • 24.0 ap380751
  • 24.0 ap382262
  • 24.0 ap382267
  • 24.0 ap382192
  • 24.0 ap380128
  • 24.0 ap382656
  • 24.0 ap383779
  • 24.0 ap382194
  • 24.0 ap382691
  • 24.0 ap382372
  • 24.0 ap380771
  • 24.0 ap382155
  • 24.0 ap382484
  • 24.0 ap383902
  • 24.0 ap382362
  • 24.0 ap383788
  • 24.0 ap383771
  • 24.0 ap382836
  • 24.0 ap382240
  • 24.0 ap383700
  • 24.0 ap383597
  • 24.0 ap381108
  • 24.0 ap379012
  • 24.0 ap382709
  • 24.0 ap381078
  • 24.0 ap383505
  • 24.0 ap382977
  • 24.0 ap382912
  • 24.0 ap383569
  • 24.0 ap383105
  • 24.0 ap380537
  • 24.0 ap382935
  • 24.0 ap381616
  • 24.0 ap383519
  • 24.0 ap381410
  • 24.0 ap383573
  • 24.0 ap382959
  • 24.0 ap376010
  • 24.0 ap380051
  • 24.0 ap381506
  • 24.0 ap381732
  • 24.0 ap383492
  • 24.0 ap383089
  • 24.0 ap383172
  • 24.0 ap381624
  • 24.0 ap383547
  • 24.0 ap381584
  • 24.0 ap382945
  • 24.0 ap382594
  • 24.0 ap383494
  • 24.0 ap381611
  • 24.0 ap380739
  • 24.0 ap381574
  • 24.0 ap383390
  • 24.0 ap383538
  • 24.0 ap382838
  • 24.0 ap382252
  • 24.0 ap383518
  • 24.0 ap383326
  • 24.0 ap383463
  • 24.0 ap383391
  • 24.0 ap380052
  • 24.0 ap383352
  • 24.0 ap383064
  • 24.0 ap382488
  • 24.0 ap381615
  • 24.0 ap382952
  • 24.0 ap381055
  • 24.0 ap383466
  • 24.0 ap383178
  • 24.0 ap383515
  • 24.0 ap383681
  • 24.0 ap383377
  • 24.0 ap383327
  • 24.0 ap383123
  • 24.0 ap383346
  • 24.0 ap383331
  • 24.0 ap382993
  • 24.0 ap383147
  • 24.0 ap382487
  • 24.0 ap383170
  • 24.0 ap382929
  • 24.0 ap383717
  • 24.0 ap380782
  • 24.0 ap382954
  • 24.0 ap382527
  • 24.0 ap383754
  • 24.0 ap382969
  • 24.0 ap382965
  • 24.0 ap380970
  • 24.0 ap382515
  • 24.0 ap382463
  • 24.0 ap382976
  • 24.0 ap380837
  • 24.0 ap381878
  • 24.0 ap381031
  • 24.0 ap383338
  • 24.0 ap383119
  • 24.0 ap380802
  • 24.0 ap383168
  • 24.0 ap383297
  • 24.0 ap383188
  • 24.0 ap381285
  • 24.0 ap381257
  • 24.0 ap383247
  • 24.0 ap382186
  • 24.0 ap381418
  • 24.0 ap381515
  • 24.0 ap381570
  • 24.0 ap383511
  • 24.0 ap381367
  • 24.0 ap378603
  • 24.0 ap381366
  • 24.0 ap382456
  • 24.0 ap381412
  • 24.0 ap383567
  • 24.0 ap381548
  • 24.0 ap379397
  • 24.0 ap381518
  • 24.0 ap381341
  • 24.0 ap381498
  • 24.0 ap381507
  • 24.0 ap381339
  • 24.0 ap383302
  • 24.0 ap381398
  • 24.0 ap380775
  • 24.0 ap381526
  • 24.0 ap383908
  • 24.0 ap383821
  • 24.0 ap383781
  • 24.0 ap381334
  • 24.0 ap382689
  • 24.0 ap381215
  • 24.0 ap382646
  • 24.0 ap382493
  • 24.0 ap382300
  • 24.0 ap381001
  • 24.0 ap380697
  • 24.0 ap382412
  • 24.0 ap381305
  • 24.0 ap381523
  • 24.0 ap380535
  • 24.0 ap381543
  • 24.0 ap381088
  • 24.0 ap382631
  • 24.0 ap379046
  • 24.0 ap380167
  • 24.0 ap381308
  • 24.0 ap381340
  • 24.0 ap380783
  • 24.0 ap383603
  • 24.0 ap381300
  • 24.0 ap381805
  • 24.0 ap381733
  • 24.0 ap381384
  • 24.0 ap373571
  • 24.0 ap380042
  • 24.0 ap381840
  • 24.0 ap381951
  • 24.0 ap382856
  • 24.0 ap383524
  • 24.0 ap380047
  • 24.0 ap381857
  • 24.0 ap383520
  • 24.0 ap381956
  • 24.0 ap381655
  • 24.0 ap381569
  • 24.0 ap379954
  • 24.0 ap383716
  • 24.0 ap383775
  • 24.0 ap383838
  • 24.0 ap383905
  • 24.0 ap383909
  • 24.0 ap383933
  • 24.0 ap383943
  • 24.0 ap383952
  • 24.0 ap383955
  • 24.0 ap383968
  • 24.0 ap383979
  • 24.0 ap384000
  • 24.0 ap384115
  • 24.0 ap383989
  • 24.0 ap384002
  • 24.0 ap383782
  • 24.0 ap383992
  • 24.0 ap383973
  • 24.0 ap383309
  • 24.0 ap383514
  • 24.0 ap383815
  • 24.0 ap383899
  • 24.0 ap383983
  • 24.0 ap383994
  • 24.0 ap383998
  • 24.0 ap384015
  • 24.0 ap384023
  • 24.0 ap384034
  • 24.0 ap384120
  • 24.0 ap384127
  • 24.0 ap384129
  • 24.0 ap384134
  • 24.0 ap384137
  • 24.0 ap384138
  • 24.0 ap384145
  • 24.0 ap384151
  • 24.0 ap384163
  • 24.0 ap384173
  • 24.0 ap384177
  • 24.0 ap384179
  • 24.0 ap384185
  • 24.0 ap384191
  • 24.0 ap384194
  • 24.0 ap384209
  • 24.0 ap384211
  • 24.0 ap384220
  • 24.0 ap384234
  • 24.0 ap384309
  • 24.0 ap384317
  • 24.0 ap381051
  • 24.0 ap381081
  • 24.0 ap382225
  • 24.0 ap382717
  • 24.0 ap382824
  • 24.0 ap382841
  • 24.0 ap382857
  • 24.0 ap382873
  • 24.0 ap382894
  • 24.0 ap384232
  • 24.0 ap384239
  • 24.0 ap384320
  • 24.0 ap384339
  • 24.0 ap384342
  • 24.0 ap384344
  • 24.0 ap384345
  • 24.0 ap384351
  • 24.0 ap384357
  • 24.0 ap384358
  • 24.0 ap384361
  • 24.0 ap384365
  • 24.0 ap384367
  • 24.0 ap384372
  • 24.0 ap384374
  • 24.0 ap384377
  • 24.0 ap384386
  • 24.0 ap384389
  • 24.0 ap384395
  • 24.0 ap384423
  • 24.0 ap384428
  • 24.0 ap384429
  • 24.0 ap384430
  • 24.0 ap384431
  • 24.0 ap384434
  • 24.0 ap384439
  • 24.0 ap384441
  • 24.0 ap384446
  • 24.0 ap384448
  • 24.0 ap384449
  • 24.0 ap384455
  • 24.0 ap384462
  • 24.0 ap384468
  • 24.0 ap384471
  • 24.0 ap384474
  • 24.0 ap384480
  • 24.0 ap384543
  • 24.0 ap384589
  • 24.0 ap384594
  • 24.0 ap384620
  • 24.0 ap384622
  • 24.0 ap384627
  • 24.0 ap384629
  • 24.0 ap384636
  • 24.0 ap384641
  • 24.0 ap384643
  • 24.0 ap384650
  • 24.0 ap375650
  • 24.0 ap384382
  • 24.0 ap384383
  • 24.0 ap384457
  • 24.0 ap384591
  • 24.0 ap384653
  • 24.0 ap384654
  • 24.0 ap384656
  • 24.0 ap384658
  • 24.0 ap384740
  • 24.0 ap384745
  • 24.0 ap384747
  • 24.0 ap384755
  • 24.0 ap384772
  • 24.0 ap384781
  • 24.0 ap384793
  • 24.0 ap384800
  • 24.0 ap384801
  • 24.0 ap384870
  • 24.0 ap384874
  • 24.0 ap384876
  • 24.0 ap384879
  • 24.0 ap384884
  • 24.0 ap384898
  • 24.0 ap384901
  • 24.0 ap384908
  • 24.0 ap384921
  • 24.0 ap384925
  • 24.0 ap384930
  • 24.0 ap384931
  • 24.0 ap384942
  • 24.0 ap384947
  • 24.0 ap384957
  • 24.0 ap384962
  • 24.0 ap385048
  • 24.0 ap385054
  • 24.0 ap385057
  • 24.0 ap385058
  • 24.0 ap385071
  • 24.0 ap385085
  • 24.0 ap385088
  • 24.0 ap385104
  • 24.0 ap385107
  • 24.0 ap385111
  • 24.0 ap385114
  • 24.0 ap385115
  • 24.0 ap385134
  • 24.0 ap385136
  • 24.0 ap385146
  • 24.0 ap385149
  • 24.0 ap385233
  • 24.0 ap385235
  • 24.0 ap385238
  • 24.0 ap385240
  • 24.0 ap385241
  • 24.0 ap385242
  • 24.0 ap385244
  • 24.0 ap385247
  • 24.0 ap385249
  • 24.0 ap385250
  • 24.0 ap385251
  • 24.0 ap385252
  • 24.0 ap385253
  • 24.0 ap385254
  • 24.0 ap385255
  • 24.0 ap385256
  • 24.0 ap385259
  • 24.0 ap385265
  • 24.0 ap385266
  • 24.0 ap385267
  • 24.0 ap385268
  • 24.0 ap385269
  • 24.0 ap385272
  • 24.0 ap385275
  • 24.0 ap385276
  • 24.0 ap385277
  • 24.0 ap385278
  • 24.0 ap385280
  • 24.0 ap385282
  • 24.0 ap385274
  • 24.0 ap385281
  • 24.0 ap385286
  • 24.0 ap385287
  • 24.0 ap385289
  • 24.0 ap385283
  • 23.0
  • 23.0 ap380204
  • 23.0 ap380281
  • 23.0 ap380355
  • 23.0 ap380375
  • 23.0 ap380391
  • 23.0 ap380396
  • 23.0 ap366748
  • 23.0 ap374310
  • 23.0 ap375293
  • 23.0 ap371233
  • 23.0 ap381051
  • 23.0 ap365558
  • 23.0 ap379795
  • 23.0 ap373098
  • 23.0 ap364705
  • 23.0 ap375539
  • 23.0 ap382358
  • 23.0 ap374143
  • 23.0 ap367292
  • 23.0 ap375289
  • 23.0 ap375624
  • 23.0 ap375317
  • 23.0 ap362261
  • 23.0 ap382281
  • 23.0 ap367434
  • 23.0 ap363641
  • 23.0 ap376661
  • 23.0 ap382262
  • 23.0 ap380691
  • 23.0 ap383569
  • 23.0 ap368179
  • 23.0 ap375601
  • 23.0 ap382206
  • 23.0 ap383829
  • 23.0 ap377319
  • 23.0 ap381081
  • 23.0 ap363869
  • 23.0 ap367895
  • 23.0 ap383902
  • 23.0 ap383519
  • 23.0 ap375345
  • 23.0 ap374085
  • 23.0 ap367488
  • 23.0 ap382236
  • 23.0 ap363192
  • 23.0 ap371974
  • 23.0 ap367223
  • 23.0 ap373017
  • 23.0 ap373752
  • 23.0 ap373882
  • 23.0 ap373861
  • 23.0 ap365531
  • 23.0 ap373870
  • 23.0 ap372929
  • 23.0 ap373952
  • 23.0 ap374037
  • 23.0 ap368214
  • 23.0 ap366264
  • 23.0 ap373769
  • 23.0 ap383779
  • 23.0 ap374583
  • 23.0 ap373009
  • 23.0 ap371300
  • 23.0 ap374125
  • 23.0 ap367985
  • 23.0 ap364367
  • 23.0 ap362578
  • 23.0 ap373871
  • 23.0 ap380766
  • 23.0 ap365598
  • 23.0 ap380849
  • 23.0 ap373912
  • 23.0 ap366334
  • 23.0 ap374421
  • 23.0 ap380692
  • 23.0 ap380758
  • 23.0 ap374305
  • 23.0 ap380771
  • 23.0 ap367992
  • 23.0 ap374055
  • 23.0 ap367547
  • 23.0 ap368000
  • 23.0 ap366366
  • 23.0 ap365227
  • 23.0 ap372015
  • 23.0 ap372012
  • 23.0 ap374668
  • 23.0 ap383788
  • 23.0 ap351263
  • 23.0 ap374715
  • 23.0 ap374691
  • 23.0 ap370792
  • 23.0 ap364467
  • 23.0 ap365701
  • 23.0 ap374255
  • 23.0 ap381357
  • 23.0 ap374311
  • 23.0 ap374162
  • 23.0 ap363644
  • 23.0 ap373754
  • 23.0 ap373301
  • 23.0 ap373182
  • 23.0 ap374226
  • 23.0 ap377423
  • 23.0 ap369489
  • 23.0 ap373294
  • 23.0 ap383524
  • 23.0 ap383302
  • 23.0 ap375902
  • 23.0 ap376010
  • 23.0 ap382487
  • 23.0 ap371314
  • 23.0 ap371327
  • 23.0 ap371285
  • 23.0 ap371368
  • 23.0 ap371167
  • 23.0 ap374454
  • 23.0 ap383538
  • 23.0 ap374109
  • 23.0 ap374639
  • 23.0 ap371099
  • 23.0 ap369731
  • 23.0 ap371310
  • 23.0 ap374315
  • 23.0 ap374249
  • 23.0 ap374493
  • 23.0 ap374165
  • 23.0 ap374361
  • 23.0 ap373330
  • 23.0 ap369928
  • 23.0 ap374296
  • 23.0 ap371319
  • 23.0 ap374210
  • 23.0 ap372116
  • 23.0 ap371748
  • 23.0 ap374472
  • 23.0 ap372453
  • 23.0 ap371432
  • 23.0 ap372345
  • 23.0 ap371868
  • 23.0 ap372121
  • 23.0 ap383710
  • 23.0 ap372995
  • 23.0 ap373511
  • 23.0 ap372873
  • 23.0 ap370427
  • 23.0 ap371209
  • 23.0 ap355298
  • 23.0 ap371811
  • 23.0 ap373589
  • 23.0 ap366525
  • 23.0 ap381596
  • 23.0 ap383567
  • 23.0 ap372533
  • 23.0 ap372922
  • 23.0 ap370538
  • 23.0 ap371268
  • 23.0 ap383681
  • 23.0 ap374498
  • 23.0 ap373004
  • 23.0 ap371269
  • 23.0 ap371456
  • 23.0 ap366201
  • 23.0 ap360464
  • 23.0 ap362035
  • 23.0 ap375383
  • 23.0 ap375770
  • 23.0 ap372607
  • 23.0 ap371259
  • 23.0 ap374794
  • 23.0 ap366296
  • 23.0 ap374892
  • 23.0 ap367007
  • 23.0 ap365754
  • 23.0 ap374785
  • 23.0 ap352402
  • 23.0 ap372079
  • 23.0 ap366797
  • 23.0 ap366335
  • 23.0 ap375465
  • 23.0 ap374609
  • 23.0 ap381366
  • 23.0 ap370383
  • 23.0 ap371722
  • 23.0 ap362749
  • 23.0 ap367323
  • 23.0 ap374820
  • 23.0 ap369763
  • 23.0 ap381657
  • 23.0 ap368517
  • 23.0 ap372455
  • 23.0 ap365058
  • 23.0 ap370362
  • 23.0 ap381358
  • 23.0 ap374723
  • 23.0 ap375353
  • 23.0 ap375370
  • 23.0 ap380041
  • 23.0 ap361414
  • 23.0 ap368643
  • 23.0 ap379140
  • 23.0 ap379501
  • 23.0 ap377147
  • 23.0 ap379417
  • 23.0 ap372207
  • 23.0 ap368743
  • 23.0 ap370464
  • 23.0 ap353137
  • 23.0 ap373016
  • 23.0 ap364518
  • 23.0 ap361651
  • 23.0 ap379339
  • 23.0 ap374711
  • 23.0 ap371091
  • 23.0 ap370763
  • 23.0 ap366610
  • 23.0 ap371021
  • 23.0 ap366275
  • 23.0 ap370909
  • 23.0 ap381243
  • 23.0 ap381271
  • 23.0 ap379449
  • 23.0 ap371052
  • 23.0 ap381247
  • 23.0 ap383603
  • 23.0 ap380249
  • 23.0 ap382195
  • 23.0 ap373571
  • 23.0 ap382668
  • 23.0 ap382493
  • 23.0 ap380269
  • 23.0 ap364371
  • 23.0 ap383716
  • 23.0 ap383775
  • 23.0 ap383909
  • 23.0 ap383943
  • 23.0 ap383952
  • 23.0 ap383955
  • 23.0 ap383979
  • 23.0 ap383838
  • 23.0 ap384023
  • 23.0 ap383717
  • 23.0 ap383797
  • 23.0 ap383815
  • 23.0 ap383998
  • 23.0 ap384015
  • 23.0 ap384127
  • 23.0 ap384131
  • 23.0 ap384151
  • 23.0 ap384173
  • 23.0 ap384179
  • 23.0 ap384185
  • 23.0 ap384211
  • 23.0 ap384220
  • 23.0 ap384245
  • 23.0 ap384344
  • 23.0 ap363366
  • 23.0 ap364258
  • 23.0 ap365170
  • 23.0 ap365576
  • 23.0 ap365858
  • 23.0 ap366221
  • 23.0 ap366294
  • 23.0 ap365801
  • 23.0 ap366170
  • 23.0 ap364925
  • 23.0 ap366295
  • 23.0 ap366346
  • 23.0 ap366348
  • 23.0 ap364295
  • 23.0 ap364559
  • 23.0 ap366118
  • 23.0 ap366252
  • 23.0 ap363729
  • 23.0 ap365390
  • 23.0 ap364932
  • 23.0 ap365239
  • 23.0 ap365759
  • 23.0 ap366211
  • 23.0 ap366290
  • 23.0 ap365223
  • 23.0 ap366117
  • 23.0 ap365730
  • 23.0 ap366261
  • 23.0 ap365889
  • 23.0 ap366181
  • 23.0 ap365115
  • 23.0 ap364048
  • 23.0 ap366298
  • 23.0 ap364699
  • 23.0 ap345032
  • 23.0 ap362683
  • 23.0 ap363361
  • 23.0 ap352969
  • 23.0 ap359103
  • 23.0 ap366375
  • 23.0 ap366912
  • 23.0 ap367109
  • 23.0 ap366397
  • 23.0 ap354354
  • 23.0 ap349850
  • 23.0 ap366880
  • 23.0 ap360007
  • 23.0 ap366744
  • 23.0 ap366747
  • 23.0 ap367206
  • 23.0 ap362771
  • 23.0 ap367291
  • 23.0 ap366916
  • 23.0 ap367207
  • 23.0 ap363363
  • 23.0 ap366959
  • 23.0 ap351530
  • 23.0 ap361116
  • 23.0 ap366898
  • 23.0 ap361533
  • 23.0 ap366827
  • 23.0 ap352962
  • 23.0 ap369295
  • 23.0 ap366358
  • 23.0 ap366677
  • 23.0 ap366882
  • 23.0 ap366972
  • 23.0 ap366486
  • 23.0 ap366803
  • 23.0 ap358290
  • 23.0 ap363265
  • 23.0 ap363128
  • 23.0 ap366701
  • 23.0 ap366373
  • 23.0 ap369674
  • 23.0 ap369206
  • 23.0 ap369065
  • 23.0 ap368327
  • 23.0 ap368632
  • 23.0 ap367290
  • 23.0 ap369302
  • 23.0 ap368419
  • 23.0 ap369501
  • 23.0 ap369219
  • 23.0 ap368604
  • 23.0 ap368706
  • 23.0 ap368461
  • 23.0 ap368612
  • 23.0 ap368552
  • 23.0 ap369529
  • 23.0 ap369748
  • 23.0 ap368218
  • 23.0 ap368913
  • 23.0 ap369607
  • 23.0 ap369693
  • 23.0 ap368510
  • 23.0 ap368445
  • 23.0 ap369106
  • 23.0 ap369257
  • 23.0 ap368987
  • 23.0 ap369150
  • 23.0 ap368695
  • 23.0 ap368167
  • 23.0 ap370361
  • 23.0 ap367969
  • 23.0 ap367367
  • 23.0 ap369434
  • 23.0 ap369132
  • 23.0 ap367678
  • 23.0 ap367517
  • 23.0 ap369863
  • 23.0 ap369227
  • 23.0 ap369454
  • 23.0 ap367332
  • 23.0 ap367794
  • 23.0 ap369934
  • 23.0 ap370196
  • 23.0 ap367358
  • 23.0 ap367453
  • 23.0 ap367732
  • 23.0 ap367646
  • 23.0 ap367874
  • 23.0 ap370344
  • 23.0 ap367524
  • 23.0 ap368153
  • 23.0 ap368087
  • 23.0 ap368180
  • 23.0 ap367726
  • 23.0 ap370103
  • 23.0 ap367396
  • 23.0 ap367340
  • 23.0 ap369855
  • 23.0 ap368140
  • 23.0 ap367998
  • 23.0 ap372337
  • 23.0 ap372706
  • 23.0 ap368032
  • 23.0 ap367906
  • 23.0 ap370138
  • 23.0 ap372380
  • 23.0 ap372246
  • 23.0 ap370193
  • 23.0 ap372643
  • 23.0 ap372560
  • 23.0 ap367513
  • 23.0 ap369931
  • 23.0 ap368195
  • 23.0 ap372243
  • 23.0 ap368216
  • 23.0 ap369929
  • 23.0 ap367365
  • 23.0 ap367782
  • 23.0 ap367675
  • 23.0 ap372757
  • 23.0 ap372389
  • 23.0 ap372799
  • 23.0 ap372641
  • 23.0 ap371050
  • 23.0 ap372338
  • 23.0 ap372422
  • 23.0 ap372033
  • 23.0 ap372178
  • 23.0 ap371516
  • 23.0 ap372351
  • 23.0 ap372708
  • 23.0 ap372100
  • 23.0 ap372504
  • 23.0 ap371961
  • 23.0 ap370590
  • 23.0 ap370544
  • 23.0 ap372599
  • 23.0 ap371836
  • 23.0 ap372674
  • 23.0 ap370911
  • 23.0 ap370817
  • 23.0 ap372043
  • 23.0 ap370802
  • 23.0 ap370437
  • 23.0 ap370926
  • 23.0 ap370884
  • 23.0 ap371366
  • 23.0 ap370952
  • 23.0 ap371281
  • 23.0 ap371436
  • 23.0 ap371153
  • 23.0 ap371033
  • 23.0 ap371977
  • 23.0 ap371627
  • 23.0 ap371155
  • 23.0 ap371295
  • 23.0 ap372152
  • 23.0 ap371760
  • 23.0 ap370627
  • 23.0 ap371583
  • 23.0 ap371546
  • 23.0 ap371770
  • 23.0 ap371437
  • 23.0 ap372091
  • 23.0 ap372163
  • 23.0 ap370737
  • 23.0 ap370908
  • 23.0 ap370465
  • 23.0 ap371587
  • 23.0 ap375133
  • 23.0 ap375266
  • 23.0 ap372099
  • 23.0 ap375254
  • 23.0 ap372016
  • 23.0 ap372177
  • 23.0 ap375242
  • 23.0 ap375291
  • 23.0 ap371775
  • 23.0 ap375688
  • 23.0 ap375382
  • 23.0 ap375634
  • 23.0 ap375449
  • 23.0 ap375321
  • 23.0 ap375685
  • 23.0 ap375509
  • 23.0 ap375719
  • 23.0 ap375720
  • 23.0 ap375464
  • 23.0 ap375625
  • 23.0 ap375709
  • 23.0 ap375343
  • 23.0 ap375533
  • 23.0 ap375672
  • 23.0 ap375545
  • 23.0 ap375264
  • 23.0 ap375661
  • 23.0 ap375646
  • 23.0 ap375238
  • 23.0 ap375304
  • 23.0 ap375097
  • 23.0 ap373664
  • 23.0 ap373562
  • 23.0 ap372932
  • 23.0 ap374339
  • 23.0 ap374265
  • 23.0 ap374230
  • 23.0 ap374430
  • 23.0 ap373102
  • 23.0 ap375655
  • 23.0 ap373777
  • 23.0 ap374113
  • 23.0 ap373015
  • 23.0 ap374971
  • 23.0 ap374803
  • 23.0 ap372974
  • 23.0 ap374312
  • 23.0 ap374354
  • 23.0 ap375018
  • 23.0 ap373018
  • 23.0 ap374506
  • 23.0 ap374588
  • 23.0 ap373950
  • 23.0 ap375038
  • 23.0 ap373480
  • 23.0 ap374238
  • 23.0 ap372845
  • 23.0 ap373564
  • 23.0 ap373482
  • 23.0 ap372994
  • 23.0 ap373137
  • 23.0 ap374977
  • 23.0 ap373034
  • 23.0 ap374324
  • 23.0 ap374031
  • 23.0 ap374093
  • 23.0 ap374507
  • 23.0 ap373684
  • 23.0 ap374356
  • 23.0 ap373820
  • 23.0 ap373104
  • 23.0 ap373954
  • 23.0 ap373644
  • 23.0 ap373899
  • 23.0 ap374822
  • 23.0 ap374254
  • 23.0 ap375069
  • 23.0 ap373918
  • 23.0 ap374557
  • 23.0 ap372854
  • 23.0 ap373647
  • 23.0 ap374838
  • 23.0 ap374330
  • 23.0 ap374799
  • 23.0 ap374428
  • 23.0 ap375936
  • 23.0 ap375862
  • 23.0 ap376041
  • 23.0 ap374895
  • 23.0 ap375793
  • 23.0 ap373046
  • 23.0 ap376181
  • 23.0 ap375003
  • 23.0 ap373539
  • 23.0 ap373111
  • 23.0 ap375734
  • 23.0 ap375743
  • 23.0 ap376087
  • 23.0 ap376179
  • 23.0 ap376100
  • 23.0 ap373299
  • 23.0 ap373303
  • 23.0 ap375908
  • 23.0 ap376356
  • 23.0 ap375984
  • 23.0 ap373318
  • 23.0 ap375865
  • 23.0 ap376038
  • 23.0 ap373257
  • 23.0 ap376218
  • 23.0 ap373438
  • 23.0 ap373212
  • 23.0 ap373271
  • 23.0 ap376509
  • 23.0 ap376252
  • 23.0 ap376602
  • 23.0 ap376752
  • 23.0 ap373452
  • 23.0 ap376429
  • 23.0 ap376860
  • 23.0 ap376710
  • 23.0 ap376410
  • 23.0 ap376298
  • 23.0 ap373189
  • 23.0 ap376426
  • 23.0 ap376873
  • 23.0 ap376668
  • 23.0 ap376407
  • 23.0 ap376670
  • 23.0 ap376485
  • 23.0 ap376652
  • 23.0 ap376523
  • 23.0 ap376656
  • 23.0 ap376620
  • 23.0 ap376531
  • 23.0 ap377412
  • 23.0 ap376762
  • 23.0 ap376541
  • 23.0 ap376671
  • 23.0 ap376844
  • 23.0 ap376701
  • 23.0 ap376614
  • 23.0 ap377578
  • 23.0 ap377496
  • 23.0 ap377508
  • 23.0 ap376416
  • 23.0 ap377778
  • 23.0 ap377516
  • 23.0 ap377644
  • 23.0 ap377755
  • 23.0 ap377540
  • 23.0 ap377497
  • 23.0 ap377523
  • 23.0 ap377581
  • 23.0 ap377727
  • 23.0 ap378436
  • 23.0 ap377515
  • 23.0 ap377674
  • 23.0 ap378400
  • 23.0 ap377566
  • 23.0 ap377494
  • 23.0 ap377799
  • 23.0 ap377779
  • 23.0 ap378165
  • 23.0 ap378332
  • 23.0 ap377757
  • 23.0 ap377908
  • 23.0 ap377802
  • 23.0 ap377999
  • 23.0 ap377984
  • 23.0 ap378134
  • 23.0 ap378545
  • 23.0 ap378863
  • 23.0 ap378882
  • 23.0 ap379016
  • 23.0 ap378599
  • 23.0 ap378218
  • 23.0 ap378164
  • 23.0 ap379085
  • 23.0 ap378880
  • 23.0 ap378862
  • 23.0 ap378425
  • 23.0 ap378259
  • 23.0 ap378970
  • 23.0 ap378153
  • 23.0 ap378585
  • 23.0 ap378509
  • 23.0 ap378393
  • 23.0 ap378079
  • 23.0 ap378404
  • 23.0 ap378471
  • 23.0 ap378966
  • 23.0 ap379049
  • 23.0 ap379012
  • 23.0 ap379080
  • 23.0 ap378865
  • 23.0 ap378140
  • 23.0 ap378574
  • 23.0 ap378440
  • 23.0 ap378823
  • 23.0 ap378603
  • 23.0 ap379397
  • 23.0 ap378953
  • 23.0 ap378866
  • 23.0 ap379008
  • 23.0 ap378924
  • 23.0 ap378581
  • 23.0 ap378999
  • 23.0 ap378161
  • 23.0 ap378080
  • 23.0 ap380161
  • 23.0 ap379046
  • 23.0 ap379874
  • 23.0 ap378391
  • 23.0 ap380239
  • 23.0 ap379772
  • 23.0 ap378419
  • 23.0 ap378257
  • 23.0 ap379838
  • 23.0 ap379531
  • 23.0 ap379888
  • 23.0 ap379167
  • 23.0 ap378485
  • 23.0 ap380167
  • 23.0 ap380099
  • 23.0 ap379847
  • 23.0 ap379098
  • 23.0 ap379972
  • 23.0 ap379438
  • 23.0 ap380143
  • 23.0 ap380187
  • 23.0 ap379427
  • 23.0 ap380045
  • 23.0 ap379848
  • 23.0 ap377384
  • 23.0 ap376984
  • 23.0 ap379890
  • 23.0 ap380128
  • 23.0 ap377149
  • 23.0 ap380446
  • 23.0 ap379694
  • 23.0 ap380270
  • 23.0 ap379780
  • 23.0 ap380371
  • 23.0 ap379752
  • 23.0 ap380137
  • 23.0 ap376989
  • 23.0 ap380180
  • 23.0 ap380042
  • 23.0 ap376935
  • 23.0 ap379487
  • 23.0 ap379934
  • 23.0 ap377023
  • 23.0 ap379833
  • 23.0 ap380473
  • 23.0 ap380535
  • 23.0 ap377068
  • 23.0 ap379853
  • 23.0 ap380998
  • 23.0 ap380626
  • 23.0 ap377079
  • 23.0 ap377329
  • 23.0 ap381091
  • 23.0 ap380751
  • 23.0 ap380543
  • 23.0 ap381270
  • 23.0 ap380817
  • 23.0 ap381055
  • 23.0 ap380506
  • 23.0 ap381275
  • 23.0 ap380739
  • 23.0 ap380783
  • 23.0 ap380970
  • 23.0 ap380537
  • 23.0 ap380697
  • 23.0 ap380936
  • 23.0 ap380486
  • 23.0 ap380512
  • 23.0 ap380737
  • 23.0 ap381118
  • 23.0 ap381072
  • 23.0 ap381584
  • 23.0 ap381088
  • 23.0 ap382053
  • 23.0 ap381523
  • 23.0 ap381732
  • 23.0 ap382372
  • 23.0 ap382252
  • 23.0 ap383002
  • 23.0 ap382857
  • 23.0 ap382846
  • 23.0 ap382253
  • 23.0 ap381322
  • 23.0 ap382057
  • 23.0 ap382386
  • 23.0 ap382709
  • 23.0 ap382954
  • 23.0 ap382225
  • 23.0 ap382717
  • 23.0 ap381840
  • 23.0 ap381594
  • 23.0 ap381410
  • 23.0 ap382463
  • 23.0 ap382198
  • 23.0 ap381526
  • 23.0 ap381498
  • 23.0 ap381418
  • 23.0 ap383573
  • 23.0 ap382838
  • 23.0 ap381609
  • 23.0 ap381548
  • 23.0 ap383706
  • 23.0 ap382945
  • 23.0 ap382300
  • 23.0 ap382615
  • 23.0 ap382977
  • 23.0 ap384345
  • 23.0 ap383547
  • 23.0 ap382158
  • 23.0 ap382240
  • 23.0 ap383515
  • 23.0 ap383754
  • 23.0 ap381961
  • 23.0 ap382526
  • 23.0 ap382951
  • 23.0 ap382824
  • 23.0 ap382993
  • 23.0 ap383536
  • 23.0 ap383247
  • 23.0 ap383170
  • 23.0 ap382032
  • 23.0 ap382992
  • 23.0 ap383365
  • 23.0 ap383772
  • 23.0 ap381569
  • 23.0 ap381348
  • 23.0 ap382192
  • 23.0 ap381367
  • 23.0 ap383352
  • 23.0 ap383597
  • 23.0 ap381622
  • 23.0 ap383518
  • 23.0 ap383492
  • 23.0 ap383309
  • 23.0 ap383064
  • 23.0 ap383168
  • 23.0 ap382362
  • 23.0 ap382434
  • 23.0 ap384431
  • 23.0 ap383514
  • 23.0 ap384441
  • 23.0 ap383994
  • 23.0 ap384034
  • 23.0 ap384120
  • 23.0 ap384134
  • 23.0 ap384191
  • 23.0 ap384234
  • 23.0 ap384309
  • 23.0 ap384317
  • 23.0 ap342846
  • 23.0 ap352264
  • 23.0 ap352954
  • 23.0 ap355907
  • 23.0 ap356141
  • 23.0 ap356752
  • 23.0 ap358046
  • 23.0 ap359922
  • 23.0 ap361443
  • 23.0 ap361930
  • 23.0 ap362693
  • 23.0 ap363247
  • 23.0 ap363431
  • 23.0 ap363672
  • 23.0 ap363710
  • 23.0 ap364519
  • 23.0 ap364532
  • 23.0 ap364634
  • 23.0 ap364753
  • 23.0 ap364956
  • 23.0 ap365040
  • 23.0 ap365155
  • 23.0 ap365646
  • 23.0 ap365661
  • 23.0 ap365689
  • 23.0 ap365744
  • 23.0 ap365770
  • 23.0 ap365773
  • 23.0 ap365798
  • 23.0 ap365886
  • 23.0 ap365900
  • 23.0 ap365946
  • 23.0 ap365979
  • 23.0 ap365983
  • 23.0 ap365984
  • 23.0 ap366120
  • 23.0 ap366247
  • 23.0 ap366395
  • 23.0 ap366398
  • 23.0 ap366411
  • 23.0 ap366443
  • 23.0 ap366661
  • 23.0 ap366684
  • 23.0 ap366835
  • 23.0 ap366836
  • 23.0 ap366842
  • 23.0 ap366879
  • 23.0 ap366905
  • 23.0 ap366940
  • 23.0 ap366967
  • 23.0 ap366968
  • 23.0 ap366982
  • 23.0 ap366984
  • 23.0 ap366986
  • 23.0 ap367006
  • 23.0 ap367014
  • 23.0 ap367112
  • 23.0 ap367113
  • 23.0 ap367129
  • 23.0 ap367196
  • 23.0 ap367222
  • 23.0 ap367227
  • 23.0 ap367233
  • 23.0 ap367263
  • 23.0 ap367307
  • 23.0 ap367325
  • 23.0 ap367356
  • 23.0 ap367366
  • 23.0 ap367413
  • 23.0 ap367419
  • 23.0 ap367436
  • 23.0 ap367487
  • 23.0 ap367647
  • 23.0 ap367781
  • 23.0 ap367810
  • 23.0 ap367827
  • 23.0 ap367893
  • 23.0 ap367991
  • 23.0 ap368352
  • 23.0 ap368437
  • 23.0 ap368458
  • 23.0 ap368485
  • 23.0 ap368590
  • 23.0 ap368605
  • 23.0 ap368634
  • 23.0 ap368651
  • 23.0 ap368682
  • 23.0 ap368725
  • 23.0 ap368827
  • 23.0 ap368830
  • 23.0 ap368854
  • 23.0 ap368933
  • 23.0 ap369012
  • 23.0 ap369047
  • 23.0 ap369048
  • 23.0 ap369052
  • 23.0 ap369078
  • 23.0 ap369103
  • 23.0 ap369127
  • 23.0 ap369136
  • 23.0 ap369179
  • 23.0 ap369211
  • 23.0 ap369276
  • 23.0 ap369300
  • 23.0 ap369316
  • 23.0 ap369469
  • 23.0 ap369521
  • 23.0 ap369535
  • 23.0 ap369580
  • 23.0 ap369595
  • 23.0 ap369619
  • 23.0 ap369623
  • 23.0 ap369624
  • 23.0 ap369675
  • 23.0 ap369680
  • 23.0 ap369702
  • 23.0 ap369710
  • 23.0 ap369724
  • 23.0 ap369757
  • 23.0 ap369770
  • 23.0 ap369775
  • 23.0 ap369779
  • 23.0 ap369783
  • 23.0 ap369784
  • 23.0 ap369877
  • 23.0 ap369878
  • 23.0 ap369883
  • 23.0 ap369884
  • 23.0 ap369885
  • 23.0 ap369899
  • 23.0 ap369902
  • 23.0 ap369903
  • 23.0 ap369991
  • 23.0 ap369997
  • 23.0 ap370017
  • 23.0 ap370036
  • 23.0 ap370040
  • 23.0 ap370085
  • 23.0 ap370093
  • 23.0 ap370147
  • 23.0 ap370194
  • 23.0 ap370199
  • 23.0 ap370218
  • 23.0 ap370222
  • 23.0 ap370244
  • 23.0 ap370249
  • 23.0 ap370300
  • 23.0 ap370307
  • 23.0 ap370326
  • 23.0 ap370328
  • 23.0 ap370347
  • 23.0 ap370479
  • 23.0 ap370537
  • 23.0 ap370539
  • 23.0 ap370578
  • 23.0 ap370620
  • 23.0 ap370662
  • 23.0 ap370720
  • 23.0 ap370735
  • 23.0 ap370801
  • 23.0 ap370907
  • 23.0 ap370918
  • 23.0 ap370935
  • 23.0 ap371056
  • 23.0 ap371080
  • 23.0 ap371125
  • 23.0 ap371151
  • 23.0 ap371254
  • 23.0 ap371301
  • 23.0 ap371423
  • 23.0 ap371490
  • 23.0 ap371506
  • 23.0 ap371529
  • 23.0 ap371539
  • 23.0 ap371547
  • 23.0 ap371557
  • 23.0 ap371565
  • 23.0 ap371582
  • 23.0 ap371634
  • 23.0 ap371680
  • 23.0 ap371687
  • 23.0 ap371721
  • 23.0 ap371733
  • 23.0 ap371768
  • 23.0 ap371772
  • 23.0 ap371829
  • 23.0 ap371886
  • 23.0 ap371917
  • 23.0 ap371922
  • 23.0 ap371945
  • 23.0 ap371996
  • 23.0 ap372011
  • 23.0 ap372077
  • 23.0 ap372286
  • 23.0 ap372293
  • 23.0 ap372343
  • 23.0 ap372432
  • 23.0 ap372436
  • 23.0 ap372475
  • 23.0 ap372502
  • 23.0 ap372505
  • 23.0 ap372508
  • 23.0 ap372510
  • 23.0 ap372516
  • 23.0 ap372561
  • 23.0 ap372610
  • 23.0 ap372617
  • 23.0 ap372633
  • 23.0 ap372655
  • 23.0 ap372692
  • 23.0 ap372796
  • 23.0 ap372890
  • 23.0 ap372910
  • 23.0 ap372942
  • 23.0 ap372943
  • 23.0 ap372989
  • 23.0 ap373001
  • 23.0 ap373047
  • 23.0 ap373097
  • 23.0 ap373146
  • 23.0 ap373172
  • 23.0 ap373180
  • 23.0 ap373197
  • 23.0 ap373239
  • 23.0 ap373261
  • 23.0 ap373284
  • 23.0 ap373300
  • 23.0 ap373332
  • 23.0 ap373336
  • 23.0 ap373339
  • 23.0 ap373340
  • 23.0 ap373392
  • 23.0 ap373412
  • 23.0 ap373521
  • 23.0 ap373534
  • 23.0 ap373565
  • 23.0 ap373584
  • 23.0 ap373649
  • 23.0 ap373711
  • 23.0 ap373717
  • 23.0 ap373783
  • 23.0 ap373821
  • 23.0 ap373872
  • 23.0 ap373881
  • 23.0 ap373914
  • 23.0 ap373924
  • 23.0 ap374144
  • 23.0 ap374145
  • 23.0 ap374211
  • 23.0 ap374270
  • 23.0 ap374286
  • 23.0 ap374414
  • 23.0 ap374530
  • 23.0 ap374548
  • 23.0 ap374600
  • 23.0 ap374605
  • 23.0 ap374641
  • 23.0 ap374643
  • 23.0 ap374695
  • 23.0 ap374786
  • 23.0 ap374829
  • 23.0 ap374832
  • 23.0 ap374869
  • 23.0 ap374917
  • 23.0 ap374935
  • 23.0 ap374943
  • 23.0 ap374956
  • 23.0 ap375004
  • 23.0 ap375021
  • 23.0 ap375036
  • 23.0 ap375039
  • 23.0 ap375041
  • 23.0 ap375125
  • 23.0 ap375153
  • 23.0 ap375205
  • 23.0 ap375207
  • 23.0 ap375210
  • 23.0 ap375214
  • 23.0 ap375240
  • 23.0 ap375260
  • 23.0 ap375270
  • 23.0 ap375273
  • 23.0 ap375335
  • 23.0 ap375342
  • 23.0 ap375351
  • 23.0 ap375398
  • 23.0 ap375409
  • 23.0 ap375412
  • 23.0 ap375414
  • 23.0 ap375421
  • 23.0 ap375425
  • 23.0 ap375430
  • 23.0 ap375432
  • 23.0 ap375453
  • 23.0 ap375466
  • 23.0 ap375469
  • 23.0 ap375476
  • 23.0 ap375484
  • 23.0 ap375488
  • 23.0 ap375489
  • 23.0 ap375502
  • 23.0 ap375514
  • 23.0 ap375518
  • 23.0 ap375603
  • 23.0 ap375700
  • 23.0 ap375711
  • 23.0 ap375730
  • 23.0 ap375748
  • 23.0 ap375756
  • 23.0 ap375757
  • 23.0 ap375804
  • 23.0 ap375828
  • 23.0 ap375849
  • 23.0 ap375860
  • 23.0 ap375944
  • 23.0 ap375949
  • 23.0 ap375950
  • 23.0 ap375959
  • 23.0 ap375962
  • 23.0 ap375982
  • 23.0 ap375989
  • 23.0 ap375990
  • 23.0 ap375996
  • 23.0 ap376000
  • 23.0 ap376001
  • 23.0 ap376012
  • 23.0 ap376024
  • 23.0 ap376042
  • 23.0 ap376099
  • 23.0 ap376140
  • 23.0 ap376156
  • 23.0 ap376189
  • 23.0 ap376213
  • 23.0 ap376220
  • 23.0 ap376267
  • 23.0 ap376308
  • 23.0 ap376317
  • 23.0 ap376340
  • 23.0 ap376341
  • 23.0 ap376384
  • 23.0 ap376414
  • 23.0 ap376445
  • 23.0 ap376450
  • 23.0 ap376486
  • 23.0 ap376507
  • 23.0 ap376512
  • 23.0 ap376529
  • 23.0 ap376613
  • 23.0 ap376622
  • 23.0 ap376664
  • 23.0 ap376666
  • 23.0 ap376695
  • 23.0 ap376696
  • 23.0 ap376699
  • 23.0 ap376702
  • 23.0 ap376704
  • 23.0 ap376721
  • 23.0 ap376722
  • 23.0 ap376736
  • 23.0 ap376787
  • 23.0 ap376798
  • 23.0 ap376802
  • 23.0 ap376809
  • 23.0 ap376818
  • 23.0 ap376820
  • 23.0 ap376842
  • 23.0 ap376878
  • 23.0 ap376889
  • 23.0 ap376934
  • 23.0 ap376945
  • 23.0 ap376956
  • 23.0 ap376979
  • 23.0 ap377012
  • 23.0 ap377033
  • 23.0 ap377050
  • 23.0 ap377091
  • 23.0 ap377109
  • 23.0 ap377120
  • 23.0 ap377163
  • 23.0 ap377175
  • 23.0 ap377177
  • 23.0 ap377229
  • 23.0 ap377378
  • 23.0 ap377399
  • 23.0 ap377485
  • 23.0 ap377517
  • 23.0 ap377538
  • 23.0 ap377555
  • 23.0 ap377569
  • 23.0 ap377628
  • 23.0 ap377630
  • 23.0 ap377651
  • 23.0 ap377667
  • 23.0 ap377670
  • 23.0 ap377687
  • 23.0 ap377718
  • 23.0 ap377723
  • 23.0 ap377737
  • 23.0 ap377743
  • 23.0 ap377751
  • 23.0 ap377868
  • 23.0 ap377878
  • 23.0 ap377888
  • 23.0 ap377913
  • 23.0 ap377966
  • 23.0 ap377983
  • 23.0 ap378010
  • 23.0 ap378014
  • 23.0 ap378019
  • 23.0 ap378029
  • 23.0 ap378051
  • 23.0 ap378070
  • 23.0 ap378087
  • 23.0 ap378122
  • 23.0 ap378141
  • 23.0 ap378142
  • 23.0 ap378144
  • 23.0 ap378150
  • 23.0 ap378154
  • 23.0 ap378168
  • 23.0 ap378178
  • 23.0 ap378227
  • 23.0 ap378234
  • 23.0 ap378242
  • 23.0 ap378248
  • 23.0 ap378258
  • 23.0 ap378372
  • 23.0 ap378383
  • 23.0 ap378390
  • 23.0 ap378415
  • 23.0 ap378437
  • 23.0 ap378481
  • 23.0 ap378506
  • 23.0 ap378535
  • 23.0 ap378553
  • 23.0 ap378575
  • 23.0 ap378595
  • 23.0 ap378818
  • 23.0 ap378827
  • 23.0 ap378886
  • 23.0 ap378902
  • 23.0 ap378913
  • 23.0 ap378920
  • 23.0 ap378952
  • 23.0 ap378976
  • 23.0 ap378987
  • 23.0 ap378995
  • 23.0 ap379069
  • 23.0 ap379091
  • 23.0 ap379105
  • 23.0 ap379112
  • 23.0 ap379122
  • 23.0 ap379152
  • 23.0 ap379168
  • 23.0 ap379187
  • 23.0 ap379190
  • 23.0 ap379199
  • 23.0 ap379329
  • 23.0 ap379331
  • 23.0 ap379346
  • 23.0 ap379373
  • 23.0 ap379378
  • 23.0 ap379389
  • 23.0 ap379390
  • 23.0 ap379391
  • 23.0 ap379395
  • 23.0 ap379411
  • 23.0 ap379423
  • 23.0 ap379474
  • 23.0 ap379475
  • 23.0 ap379482
  • 23.0 ap379511
  • 23.0 ap379515
  • 23.0 ap379532
  • 23.0 ap379533
  • 23.0 ap379535
  • 23.0 ap379565
  • 23.0 ap379600
  • 23.0 ap379616
  • 23.0 ap379627
  • 23.0 ap379635
  • 23.0 ap379781
  • 23.0 ap379782
  • 23.0 ap379830
  • 23.0 ap379839
  • 23.0 ap379855
  • 23.0 ap379889
  • 23.0 ap379903
  • 23.0 ap379921
  • 23.0 ap379925
  • 23.0 ap379957
  • 23.0 ap379963
  • 23.0 ap380109
  • 23.0 ap380181
  • 23.0 ap380196
  • 23.0 ap380256
  • 23.0 ap380264
  • 23.0 ap380282
  • 23.0 ap380465
  • 23.0 ap380501
  • 23.0 ap380581
  • 23.0 ap380613
  • 23.0 ap380620
  • 23.0 ap380635
  • 23.0 ap380637
  • 23.0 ap380762
  • 23.0 ap380775
  • 23.0 ap380782
  • 23.0 ap380802
  • 23.0 ap380840
  • 23.0 ap380939
  • 23.0 ap381001
  • 23.0 ap381004
  • 23.0 ap381047
  • 23.0 ap381078
  • 23.0 ap381108
  • 23.0 ap381128
  • 23.0 ap381215
  • 23.0 ap381257
  • 23.0 ap381285
  • 23.0 ap381292
  • 23.0 ap381300
  • 23.0 ap381305
  • 23.0 ap381308
  • 23.0 ap381334
  • 23.0 ap381339
  • 23.0 ap381384
  • 23.0 ap381385
  • 23.0 ap381398
  • 23.0 ap381412
  • 23.0 ap381507
  • 23.0 ap381518
  • 23.0 ap381527
  • 23.0 ap381543
  • 23.0 ap381570
  • 23.0 ap381575
  • 23.0 ap381600
  • 23.0 ap381611
  • 23.0 ap381615
  • 23.0 ap381616
  • 23.0 ap381621
  • 23.0 ap381623
  • 23.0 ap381624
  • 23.0 ap381654
  • 23.0 ap381666
  • 23.0 ap381734
  • 23.0 ap381775
  • 23.0 ap381809
  • 23.0 ap381825
  • 23.0 ap381826
  • 23.0 ap381854
  • 23.0 ap381874
  • 23.0 ap381878
  • 23.0 ap381936
  • 23.0 ap381952
  • 23.0 ap381956
  • 23.0 ap381970
  • 23.0 ap381971
  • 23.0 ap381975
  • 23.0 ap382039
  • 23.0 ap382042
  • 23.0 ap382045
  • 23.0 ap382098
  • 23.0 ap382155
  • 23.0 ap382160
  • 23.0 ap382164
  • 23.0 ap382167
  • 23.0 ap382170
  • 23.0 ap382189
  • 23.0 ap382194
  • 23.0 ap382231
  • 23.0 ap382267
  • 23.0 ap382277
  • 23.0 ap382412
  • 23.0 ap382441
  • 23.0 ap382445
  • 23.0 ap382474
  • 23.0 ap382484
  • 23.0 ap382488
  • 23.0 ap382527
  • 23.0 ap382594
  • 23.0 ap382631
  • 23.0 ap382656
  • 23.0 ap382673
  • 23.0 ap382676
  • 23.0 ap382677
  • 23.0 ap382691
  • 23.0 ap382692
  • 23.0 ap382703
  • 23.0 ap382740
  • 23.0 ap382750
  • 23.0 ap382836
  • 23.0 ap382841
  • 23.0 ap382873
  • 23.0 ap382894
  • 23.0 ap382912
  • 23.0 ap382929
  • 23.0 ap382935
  • 23.0 ap382965
  • 23.0 ap382969
  • 23.0 ap382976
  • 23.0 ap382994
  • 23.0 ap383105
  • 23.0 ap383123
  • 23.0 ap383147
  • 23.0 ap383178
  • 23.0 ap383188
  • 23.0 ap383297
  • 23.0 ap383326
  • 23.0 ap383327
  • 23.0 ap383331
  • 23.0 ap383346
  • 23.0 ap383377
  • 23.0 ap383455
  • 23.0 ap383459
  • 23.0 ap383463
  • 23.0 ap383494
  • 23.0 ap383498
  • 23.0 ap383511
  • 23.0 ap383520
  • 23.0 ap383700
  • 23.0 ap383821
  • 23.0 ap384239
  • 23.0 ap384339
  • 23.0 ap384351
  • 23.0 ap384361
  • 23.0 ap384367
  • 23.0 ap384389
  • 23.0 ap384395
  • 23.0 ap384428
  • 23.0 ap384429
  • 23.0 ap384434
  • 23.0 ap384448
  • 23.0 ap384471
  • 23.0 ap384474
  • 23.0 ap384543
  • 23.0 ap384622
  • 23.0 ap384629
  • 23.0 ap384639
  • 23.0 ap384643
  • 23.0 ap384650
  • 23.0 ap384591
  • 23.0 ap384745
  • 23.0 ap384876
  • 23.0 ap384901
  • 23.0 ap384930
  • 23.0 ap384931
  • 23.0 ap385048
  • 23.0 ap385072
  • 23.0 ap384382
  • 23.0 ap384383
  • 23.0 ap384457
  • 23.0 ap384761
  • 23.0 ap384772
  • 23.0 ap384793
  • 23.0 ap384800
  • 23.0 ap384801
  • 23.0 ap384879
  • 23.0 ap384898
  • 23.0 ap384908
  • 23.0 ap384921
  • 23.0 ap384947
  • 23.0 ap384957
  • 23.0 ap385046
  • 23.0 ap385054
  • 23.0 ap385071
  • 23.0 ap385085
  • 23.0 ap385088
  • 23.0 ap385104
  • 23.0 ap385107
  • 23.0 ap385111
  • 23.0 ap385115
  • 23.0 ap385117
  • 23.0 ap385136
  • 23.0 ap385146
  • 23.0 ap385149
  • 23.0 ap385233
  • 23.0 ap385236
  • 23.0 ap385238
  • 23.0 ap385242
  • 23.0 ap385244
  • 23.0 ap385247
  • 23.0 ap385251
  • 23.0 ap385252
  • 23.0 ap385253
  • 23.0 ap385254
  • 23.0 ap385256
  • 23.0 ap385266
  • 23.0 ap385267
  • 23.0 ap385268
  • 23.0 ap385269
  • 23.0 ap385272
  • 23.0 ap385275
  • 23.0 ap385276
  • 23.0 ap385277
  • 23.0 ap385280
  • 23.0 ap385282
  • 23.0 ap385265
  • 23.0 ap385286
  • 23.0 ap385287
  • RI.2022.08
  • RI.2022.09
  • RI.2022.10
  • RI.2022.12
  • RI.2023.01
  • RI.2023.03
  • RI.2023.02
  • RI.2023.04
Problem Types
TypeCWE IDDescription
cweCWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: cwe
CWE ID: CWE-79
Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF
x_transferred
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ykramarz@cisco.com
Published At:03 Aug, 2023 | 22:15
Updated At:25 Jan, 2024 | 17:15

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot Application Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Secondary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>broadworks_application_delivery_platform>>Versions before ri.2023.06(exclusive)
cpe:2.3:a:cisco:broadworks_application_delivery_platform:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>broadworks_application_server>>Versions before 23.0.2023.08(exclusive)
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:-:*:*:*
Cisco Systems, Inc.
cisco
>>broadworks_application_server>>Versions before 2023.06(exclusive)
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:release_independent:*:*:*
Cisco Systems, Inc.
cisco
>>broadworks_application_server>>Versions from 24.0(inclusive) to 24.0.2023.08(exclusive)
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:-:*:*:*
Cisco Systems, Inc.
cisco
>>broadworks_xtended_services_platform>>Versions before 23.0.2023.08(exclusive)
cpe:2.3:a:cisco:broadworks_xtended_services_platform:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE-79Secondaryykramarz@cisco.com
CWE ID: CWE-79
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-79
Type: Secondary
Source: ykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezFykramarz@cisco.com
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF
Source: ykramarz@cisco.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

9498Records found

CVE-2019-1777
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.17% / 38.86%
||
7 Day CHG~0.00%
Published-18 Apr, 2019 | 00:25
Updated-21 Nov, 2024 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Registered Envelope Service Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based interface of the Cisco Registered Envelope Service could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against another user of the service. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected software. An attacker could exploit this vulnerability by sending an email with a malicious payload to another user. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. This vulnerability affects software versions 5.3.4.x.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-registered_envelope_serviceCisco Registered Envelope Service
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-15968
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.29% / 51.75%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 03:42
Updated-21 Nov, 2024 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Communications Domain Manager Persistent Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Communications Domain Manager (Unified CDM) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_domain_managerhosted_collaboration_solutionCisco Unified Communications Domain Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-15270
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.18% / 40.47%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 18:36
Updated-21 Nov, 2024 | 19:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_management_center_2500firepower_management_center_2600firepower_management_center_virtual_appliancefirepower_management_centerfirepower_management_center_4500firepower_management_center_1000firepower_management_center_4600firepower_management_center_firmwarefirepower_management_center_2000ngips_virtual_appliancefirepower_management_center_4000firepower_management_center_1600Cisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-12637
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.29% / 51.75%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 18:36
Updated-21 Nov, 2024 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Multiple Stored Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web-based management interface. The vulnerabilities are due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-12702
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.29% / 51.75%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 18:36
Updated-21 Nov, 2024 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SPA100 Series Analog Telephone Adapters Reflected Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to conduct cross-site scripting attacks. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-spa112_firmwarespa122_firmwarespa112spa122Cisco SPA112 2-Port Phone Adapter
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-12638
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.29% / 51.75%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 18:36
Updated-21 Nov, 2024 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-20208
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.03% / 8.40%
||
7 Day CHG~0.00%
Published-05 Mar, 2025 | 16:50
Updated-25 Mar, 2025 | 12:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_management_suiteCisco TelePresence Management Suite (TMS)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-16008
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.29% / 51.75%
||
7 Day CHG~0.00%
Published-26 Jan, 2020 | 04:45
Updated-15 Nov, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability

A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ip_phone_8841ip_phone_8832ip_phone_8861ip_phone_8831_firmwareip_phone_6851ip_phone_8831ip_phone_8845_firmwareip_phone_7841ip_phone_7811_firmwareip_phone_8811ip_phone_6821ip_phone_7832ip_phone_8811_firmwareip_phone_7861_firmwareip_phone_8845ip_phone_8851_firmwareip_phone_6821_firmwareip_phone_6841ip_phone_7821_firmwareip_phone_8841_firmwareip_phone_8865_firmwareip_phone_8865ip_phone_6851_firmwareip_phone_6871ip_phone_6871_firmwareip_phone_7841_firmwareip_phone_6825_firmwareip_phone_8832_firmwareip_phone_6825ip_phone_6861ip_phone_6861_firmwareip_phone_7832_firmwareip_phone_7811ip_phone_7861ip_phone_6841_firmwareip_phone_8851ip_phone_8861_firmwareip_phone_7821Cisco IP Phone 7800 Series with Multiplatform Firmware
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20133
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.14% / 34.85%
||
7 Day CHG~0.00%
Published-07 Jul, 2023 | 19:47
Updated-23 Oct, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because of insufficient validation of user-supplied input in Webex Events (classic) programs, email templates, and survey questions. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetingsCisco Webex Meetings
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20037
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.07% / 22.61%
||
7 Day CHG~0.00%
Published-19 Jan, 2023 | 01:34
Updated-02 Aug, 2024 | 08:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco Industrial Network Director could allow an authenticated, remote attacker to conduct stored cross-site scripting (XSS) attacks. The vulnerability is due to improper validation of content submitted to the affected application. An attacker could exploit this vulnerability by sending requests containing malicious values to the affected system. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-industrial_network_directorCisco Industrial Network Director
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20028
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.12% / 31.60%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-25 Oct, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_and_web_managersecure_email_gatewayweb_security_applianceCisco Web Security Appliance (WSA)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20205
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.09% / 26.10%
||
7 Day CHG~0.00%
Published-16 Aug, 2023 | 21:38
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureevolved_programmable_network_managerCisco Prime InfrastructureCisco Evolved Programmable Network Manager (EPNM)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20249
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.08% / 23.53%
||
7 Day CHG~0.00%
Published-24 Apr, 2024 | 20:47
Updated-24 Apr, 2025 | 14:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_management_suiteCisco TelePresence Management Suite (TMS)telepresence_management_suite
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20265
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.49%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 18:45
Updated-29 Aug, 2024 | 20:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of a small subset of Cisco IP Phones could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials to access the web-based management interface of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ip_dect_110_firmwareunified_ip_phone_6901_firmwareunified_ip_phone_6901ip_dect_210ip_dect_210_firmwareip_dect_110unified_sip_phone_3905_firmwareunified_sip_phone_3905Cisco IP Phones with Multiplatform FirmwareCisco Session Initiation Protocol (SIP) Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20203
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.09% / 26.10%
||
7 Day CHG~0.00%
Published-16 Aug, 2023 | 21:38
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureevolved_programmable_network_managerCisco Prime InfrastructureCisco Evolved Programmable Network Manager (EPNM)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20132
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.13% / 33.41%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-25 Oct, 2024 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Meetings Web UI Vulnerabilities

Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or upload arbitrary files as recordings. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetingsCisco Webex Meetings
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20201
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.05% / 15.11%
||
7 Day CHG~0.00%
Published-16 Aug, 2023 | 21:39
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureevolved_programmable_network_managerCisco Prime InfrastructureCisco Evolved Programmable Network Manager (EPNM)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20120
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.12% / 31.60%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-25 Oct, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_and_web_managersecure_email_gatewayweb_security_applianceCisco Web Security Appliance (WSA)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20069
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.10% / 27.66%
||
7 Day CHG~0.00%
Published-03 Mar, 2023 | 00:00
Updated-25 Oct, 2024 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Prime Infrastructure and Evolved Programmable Network Manager Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureevolved_programmable_network_managerCisco Prime Infrastructure
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20131
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.11% / 30.47%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-25 Oct, 2024 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow a remote attacker to obtain privileged information and conduct cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureevolved_programmable_network_managerCisco Prime Infrastructure
CWE ID-CWE-27
Path Traversal: 'dir/../../filename'
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20179
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.08% / 24.54%
||
7 Day CHG~0.00%
Published-27 Sep, 2023 | 17:24
Updated-23 Sep, 2024 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content. This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_vmanageCisco SD-WAN vManage
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20096
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.13% / 33.54%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-25 Oct, 2024 | 16:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Contact Center Express Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack. This vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by entering crafted text into various input fields within the web-based management interface. A successful exploit could allow the attacker to perform a stored XSS attack, which could allow the execution of scripts within the context of other users of the interface.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_contact_center_expressCisco Unified Contact Center Express
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20248
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.08% / 23.53%
||
7 Day CHG~0.00%
Published-24 Apr, 2024 | 20:46
Updated-04 Apr, 2025 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_management_suiteCisco TelePresence Management Suite (TMS)telepresence_management_suite
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-20628
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.19% / 41.35%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 03:16
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-1599
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.32% / 54.72%
||
7 Day CHG~0.00%
Published-22 Jul, 2021 | 15:20
Updated-07 Nov, 2024 | 22:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Customer Voice Portal Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Customer Voice Portal (CVP) could allow an authenticated, remote attacker to perform a cross-site scripting (XSS) attack against a user. This vulnerability is due to insufficient input validation of a parameter that is used by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface, access sensitive, browser-based information, or cause an affected device to reboot under certain conditions.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_customer_voice_portalCisco Unified Customer Voice Portal (CVP)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-1582
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.17% / 38.67%
||
7 Day CHG~0.00%
Published-25 Aug, 2021 | 19:10
Updated-07 Nov, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability

A vulnerability in the web UI of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by sending malicious input to the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-application_policy_infrastructure_controllercloud_application_policy_infrastructure_controllerCisco Application Policy Infrastructure Controller (APIC)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-26067
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-8.87% / 92.22%
||
7 Day CHG~0.00%
Published-18 Nov, 2024 | 16:10
Updated-01 Aug, 2025 | 20:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Teams Web Interface Cross-Site Scripting Vulnerability

A vulnerability in the web-based interface of Cisco Webex Teams could allow an authenticated, remote attacker to conduct cross-site scripting attacks. The vulnerability is due to improper validation of usernames. An attacker could exploit this vulnerability by creating an account that contains malicious HTML or script content and joining a space using the malicious account name. A successful exploit could allow the attacker to conduct cross-site scripting attacks and potentially gain access to sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_teamsCisco Webex Teams
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CVE-2024-20504
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.07% / 22.89%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:29
Updated-07 Aug, 2025 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerabilities

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_web_appliance_virtual_s1000vsecure_email_gateway_c695secure_web_appliance_virtual_s600vsecure_email_and_web_manager_m690secure_email_gateway_virtual_appliance_c600vsecure_email_and_web_manager_m390secure_email_and_web_manager_m195secure_email_and_web_manager_m395secure_web_appliance_s196secure_email_and_web_manager_virtual_appliance_m100vsecure_email_and_web_manager_m390xsecure_email_gateway_c395secure_email_and_web_manager_m695secure_web_appliance_virtual_s100vsecure_email_gateway_c195secure_email_and_web_manager_m690xsecure_email_and_web_manager_m170secure_web_appliance_virtual_s300vsecure_email_and_web_manager_virtual_appliance_m300vsecure_email_and_web_manager_virtual_appliance_m600vsecure_web_appliance_s396secure_email_and_web_manager_m190asyncossecure_email_and_web_manager_m680secure_email_and_web_manager_m380secure_web_appliance_s696secure_email_gateway_virtual_appliance_c100vsecure_email_gateway_virtual_appliance_c300vCisco Secure Web ApplianceCisco Secure Email and Web ManagerCisco Secure Email
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CVE-2025-20331
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 11.19%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 16:14
Updated-07 Aug, 2025 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabiliy

A vulnerability in the web-based management interface of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to conduct a stored XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco Identity Services Engine SoftwareCisco ISE Passive Identity Connector
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CVE-2022-20852
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.15% / 36.54%
||
7 Day CHG-0.16%
Published-10 Aug, 2022 | 08:10
Updated-01 Nov, 2024 | 18:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Meetings Web Interface Vulnerabilities

Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow a remote attacker to conduct a cross-site scripting (XSS) attack or a frame hijacking attack against a user of the web interface. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetingsCisco Webex Meetings
CWE ID-CWE-1021
Improper Restriction of Rendered UI Layers or Frames
CVE-2025-20166
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 9.53%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 16:19
Updated-23 Jul, 2025 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Common Services Platform Collector Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device. Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-common_services_platform_collectorcrosswork_network_controllerCisco Common Services Platform Collector Software
CWE ID-CWE-86
Improper Neutralization of Invalid Characters in Identifiers in Web Pages
CVE-2025-20168
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 9.53%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 16:19
Updated-23 Jul, 2025 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Common Services Platform Collector Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device. Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-common_services_platform_collectorcrosswork_network_controllerCisco Common Services Platform Collector Software
CWE ID-CWE-86
Improper Neutralization of Invalid Characters in Identifiers in Web Pages
CVE-2025-20167
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 9.53%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 16:19
Updated-23 Jul, 2025 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Common Services Platform Collector Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device. Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-common_services_platform_collectorcrosswork_network_controllerCisco Common Services Platform Collector Software
CWE ID-CWE-86
Improper Neutralization of Invalid Characters in Identifiers in Web Pages
CVE-2025-20342
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 8.87%
||
7 Day CHG~0.00%
Published-27 Aug, 2025 | 16:23
Updated-27 Aug, 2025 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Integrated Management Controller Virtual Keyboard Video Monitor (vKVM) Stored Cross-Site Scripting Vulnerability

A vulnerability in the Virtual Keyboard Video Monitor (vKVM) connection handling of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with low privileges to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid user credentials with privileges that allow for vKVM access on the affected device. Note: The affected vKVM client is also included in Cisco UCS Manager.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco Unified Computing System (Standalone)Cisco Unified Computing System (Managed)Cisco Unified Computing System E-Series Software (UCSE)
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CVE-2023-20134
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.09% / 26.88%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-25 Oct, 2024 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Meetings Web UI Vulnerabilities

Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or upload arbitrary files as recordings. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetingsCisco Webex Meetings
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2021-1218
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.03% / 7.03%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 20:11
Updated-12 Nov, 2024 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Smart Software Manager Satellite Open Redirect Vulnerability

A vulnerability in the web management interface of Cisco Smart Software Manager satellite could allow an authenticated, remote attacker to redirect a user to an undesired web page. The vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request that could cause the web application to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious website.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-smart_software_manager_on-premCisco Smart Software Manager On-Prem
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2011-0961
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-18.65% / 95.02%
||
7 Day CHG~0.00%
Published-20 May, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in cwhp/device.center.do in the Help servlet in Cisco CiscoWorks Common Services 3.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the device parameter, aka Bug ID CSCto12704.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ciscoworks_common_servicesn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-0962
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-8.45% / 91.97%
||
7 Day CHG~0.00%
Published-20 May, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in CSCOnm/servlet/com.cisco.nm.help.ServerHelpEngine in the Common Services Device Center in Cisco Unified Operations Manager (CUOM) before 8.6 allows remote attackers to inject arbitrary web script or HTML via the tag parameter, aka Bug ID CSCto12712.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_operations_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-0959
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-51.09% / 97.78%
||
7 Day CHG~0.00%
Published-20 May, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Cisco Unified Operations Manager (CUOM) before 8.6 allow remote attackers to inject arbitrary web script or HTML via (1) the extn parameter to iptm/advancedfind.do, (2) the deviceInstanceName parameter to iptm/ddv.do, the (3) cmd or (4) group parameter to iptm/eventmon, the (5) clusterName or (6) deviceName parameter to iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp, or the (7) ccmName or (8) clusterName parameter to iptm/logicalTopo.do, aka Bug ID CSCtn61716.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_operations_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3463
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.41% / 60.24%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 18:00
Updated-13 Nov, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Meetings Reflected Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected service. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetings_onlineCisco Webex Meetings
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3431
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 8.74%
||
7 Day CHG~0.00%
Published-18 Nov, 2024 | 16:02
Updated-18 Nov, 2024 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business RV Series Routers Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Small Business RV042 Dual WAN VPN Routers and Cisco Small Business RV042G Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco Small Business RV Series Router Firmware
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3583
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 52.73%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 18:36
Updated-13 Nov, 2024 | 17:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseadaptive_security_appliance_softwareCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3589
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.20% / 41.97%
||
7 Day CHG~0.00%
Published-08 Oct, 2020 | 04:20
Updated-13 Nov, 2024 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need to have valid administrative credentials.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3591
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.19% / 41.73%
||
7 Day CHG~0.00%
Published-06 Nov, 2020 | 18:17
Updated-13 Nov, 2024 | 17:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_vmanagecatalyst_sd-wan_managerCisco SD-WAN vManage
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3579
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.35% / 56.44%
||
7 Day CHG~0.00%
Published-06 Nov, 2020 | 18:16
Updated-13 Nov, 2024 | 17:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_vmanagecatalyst_sd-wan_managerCisco SD-WAN vManage
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3340
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.17% / 38.63%
||
7 Day CHG~0.00%
Published-02 Jul, 2020 | 04:20
Updated-15 Nov, 2024 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need valid administrative credentials.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3354
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.19% / 41.34%
||
7 Day CHG~0.00%
Published-18 Jun, 2020 | 02:16
Updated-15 Nov, 2024 | 17:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Data Center Network Manager Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need administrative credentials on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-data_center_network_managerCisco Data Center Network Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3355
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.19% / 41.34%
||
7 Day CHG~0.00%
Published-18 Jun, 2020 | 02:16
Updated-15 Nov, 2024 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Data Center Network Manager Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need administrative credentials on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-data_center_network_managerCisco Data Center Network Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3582
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.24% / 46.79%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 18:36
Updated-13 Nov, 2024 | 17:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseadaptive_security_appliance_softwareCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-3553
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.14% / 34.74%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 18:35
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 189
  • 190
  • Next
Details not found