Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-20204

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-03 Aug, 2023 | 21:15
Updated At-21 Nov, 2024 | 21:41
Rejected At-
Credits

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot Application Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:03 Aug, 2023 | 21:15
Updated At:21 Nov, 2024 | 21:41
Rejected At:
▼CVE Numbering Authority (CNA)

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot Application Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco BroadWorks
Versions
Affected
  • 24.0 ap375672
  • 24.0 ap375655
  • 24.0 ap376979
  • 24.0 ap379112
  • 24.0 ap379588
  • 24.0 ap378485
  • 24.0 ap376934
  • 24.0 ap379533
  • 24.0 ap374230
  • 24.0 ap378382
  • 24.0 ap375720
  • 24.0 ap378575
  • 24.0 ap378248
  • 24.0 ap378990
  • 24.0 ap378425
  • 24.0 ap377319
  • 24.0 ap378818
  • 24.0 ap375453
  • 24.0 ap376317
  • 24.0 ap376677
  • 24.0 ap375688
  • 24.0 ap377147
  • 24.0 ap376945
  • 24.0 ap377517
  • 24.0 ap376205
  • 24.0 ap378257
  • 24.0 ap378471
  • 24.0 ap376669
  • 24.0 ap375756
  • 24.0 ap378440
  • 24.0 ap376486
  • 24.0 ap378920
  • 24.0 ap375734
  • 24.0 ap378144
  • 24.0 ap375036
  • 24.0 ap375624
  • 24.0 ap378882
  • 24.0 ap376531
  • 24.0 ap375804
  • 24.0 ap376137
  • 24.0 ap377378
  • 24.0 ap376844
  • 24.0 ap376696
  • 24.0 ap378599
  • 24.0 ap378880
  • 24.0 ap374530
  • 24.0 ap375369
  • 24.0 ap376147
  • 24.0 ap376140
  • 24.0 ap379501
  • 24.0 ap378150
  • 24.0 ap375100
  • 24.0 ap376622
  • 24.0 ap379339
  • 24.0 ap377163
  • 24.0 ap375464
  • 24.0 ap376023
  • 24.0 ap378164
  • 24.0 ap378154
  • 24.0 ap377068
  • 24.0 ap377177
  • 24.0 ap377091
  • 24.0 ap377515
  • 24.0 ap379190
  • 24.0 ap378595
  • 24.0 ap374832
  • 24.0 ap367206
  • 24.0 ap377868
  • 24.0 ap378902
  • 24.0 ap375210
  • 24.0 ap375353
  • 24.0 ap376098
  • 24.0 ap378383
  • 24.0 ap379122
  • 24.0 ap376710
  • 24.0 ap376602
  • 24.0 ap378535
  • 24.0 ap377729
  • 24.0 ap375990
  • 24.0 ap375748
  • 24.0 ap376935
  • 24.0 ap376426
  • 24.0 ap375743
  • 24.0 ap379109
  • 24.0 ap378080
  • 24.0 ap375449
  • 24.0 ap375922
  • 24.0 ap377984
  • 24.0 ap379391
  • 24.0 ap379378
  • 24.0 ap376512
  • 24.0 ap376956
  • 24.0 ap369855
  • 24.0 ap379098
  • 24.0 ap376736
  • 24.0 ap377674
  • 24.0 ap375625
  • 24.0 ap378393
  • 24.0 ap376620
  • 24.0 ap372799
  • 24.0 ap378976
  • 24.0 ap376989
  • 24.0 ap378862
  • 24.0 ap378242
  • 24.0 ap375489
  • 24.0 ap379475
  • 24.0 ap376820
  • 24.0 ap375533
  • 24.0 ap376308
  • 24.0 ap376798
  • 24.0 ap375661
  • 24.0 ap378953
  • 24.0 ap371233
  • 24.0 ap377628
  • 24.0 ap375266
  • 24.0 ap376984
  • 24.0 ap375021
  • 24.0 ap377966
  • 24.0 ap375484
  • 24.0 ap378436
  • 24.0 ap378886
  • 24.0 ap375709
  • 24.0 ap376267
  • 24.0 ap375514
  • 24.0 ap377743
  • 24.0 ap377878
  • 24.0 ap378308
  • 24.0 ap379487
  • 24.0 ap376038
  • 24.0 ap377802
  • 24.0 ap376507
  • 24.0 ap377630
  • 24.0 ap378913
  • 24.0 ap376252
  • 24.0 ap376407
  • 24.0 ap376410
  • 24.0 ap376523
  • 24.0 ap375342
  • 24.0 ap375304
  • 24.0 ap378553
  • 24.0 ap375205
  • 24.0 ap376889
  • 24.0 ap376529
  • 24.0 ap375214
  • 24.0 ap377888
  • 24.0 ap377913
  • 24.0 ap376024
  • 24.0 ap378390
  • 24.0 ap375382
  • 24.0 ap379395
  • 24.0 ap377120
  • 24.0 ap378400
  • 24.0 ap376878
  • 24.0 ap377723
  • 24.0 ap374691
  • 24.0 ap379346
  • 24.0 ap378218
  • 24.0 ap376842
  • 24.0 ap374270
  • 24.0 ap376000
  • 24.0 ap376702
  • 24.0 ap377497
  • 24.0 ap375018
  • 24.0 ap378506
  • 24.0 ap377412
  • 24.0 ap375959
  • 24.0 ap379016
  • 24.0 ap379438
  • 24.0 ap378995
  • 24.0 ap378258
  • 24.0 ap378574
  • 24.0 ap375711
  • 24.0 ap376809
  • 24.0 ap375634
  • 24.0 ap375646
  • 24.0 ap375488
  • 24.0 ap377555
  • 24.0 ap375293
  • 24.0 ap378322
  • 24.0 ap378029
  • 24.0 ap379373
  • 24.0 ap377737
  • 24.0 ap378010
  • 24.0 ap378481
  • 24.0 ap376721
  • 24.0 ap375860
  • 24.0 ap378332
  • 24.0 ap379389
  • 24.0 ap377983
  • 24.0 ap378866
  • 24.0 ap377399
  • 24.0 ap376722
  • 24.0 ap379474
  • 24.0 ap378070
  • 24.0 ap376670
  • 24.0 ap375207
  • 24.0 ap376100
  • 24.0 ap378122
  • 24.0 ap376012
  • 24.0 ap375828
  • 24.0 ap378827
  • 24.0 ap376787
  • 24.0 ap376414
  • 24.0 ap377786
  • 24.0 ap376485
  • 24.0 ap379069
  • 24.0 ap378863
  • 24.0 ap376298
  • 24.0 ap373564
  • 24.0 ap376429
  • 24.0 ap379449
  • 24.0 ap377485
  • 24.0 ap378051
  • 24.0 ap375849
  • 24.0 ap376099
  • 24.0 ap378234
  • 24.0 ap377033
  • 24.0 ap377079
  • 24.0 ap375950
  • 24.0 ap375412
  • 24.0 ap375757
  • 24.0 ap376762
  • 24.0 ap376445
  • 24.0 ap379515
  • 24.0 ap375351
  • 24.0 ap375273
  • 24.0 ap378896
  • 24.0 ap379199
  • 24.0 ap374803
  • 24.0 ap375685
  • 24.0 ap375270
  • 24.0 ap370326
  • 24.0 ap375603
  • 24.0 ap376802
  • 24.0 ap376704
  • 24.0 ap379423
  • 24.0 ap376001
  • 24.0 ap377508
  • 24.0 ap375989
  • 24.0 ap376699
  • 24.0 ap377012
  • 24.0 ap379532
  • 24.0 ap378141
  • 24.0 ap375949
  • 24.0 ap375996
  • 24.0 ap378087
  • 24.0 ap378178
  • 24.0 ap375862
  • 24.0 ap376042
  • 24.0 ap378079
  • 24.0 ap379390
  • 24.0 ap378970
  • 24.0 ap375908
  • 24.0 ap378019
  • 24.0 ap377329
  • 24.0 ap376356
  • 24.0 ap377908
  • 24.0 ap377751
  • 24.0 ap377581
  • 24.0 ap375902
  • 24.0
  • 24.0 ap356141
  • 24.0 ap358290
  • 24.0 ap362693
  • 24.0 ap370935
  • 24.0 ap372508
  • 24.0 ap372932
  • 24.0 ap375289
  • 24.0 ap375291
  • 24.0 ap375317
  • 24.0 ap375370
  • 24.0 ap375398
  • 24.0 ap375409
  • 24.0 ap375430
  • 24.0 ap375432
  • 24.0 ap375465
  • 24.0 ap375466
  • 24.0 ap375469
  • 24.0 ap375502
  • 24.0 ap375518
  • 24.0 ap375522
  • 24.0 ap375539
  • 24.0 ap375785
  • 24.0 ap375920
  • 24.0 ap376156
  • 24.0 ap376189
  • 24.0 ap376213
  • 24.0 ap376218
  • 24.0 ap376340
  • 24.0 ap376384
  • 24.0 ap376541
  • 24.0 ap376652
  • 24.0 ap376666
  • 24.0 ap376668
  • 24.0 ap376682
  • 24.0 ap376689
  • 24.0 ap376695
  • 24.0 ap376752
  • 24.0 ap376818
  • 24.0 ap376873
  • 24.0 ap377023
  • 24.0 ap377037
  • 24.0 ap377050
  • 24.0 ap377175
  • 24.0 ap377229
  • 24.0 ap377384
  • 24.0 ap377423
  • 24.0 ap377496
  • 24.0 ap377516
  • 24.0 ap377538
  • 24.0 ap377569
  • 24.0 ap377651
  • 24.0 ap377687
  • 24.0 ap377718
  • 24.0 ap377727
  • 24.0 ap377757
  • 24.0 ap377779
  • 24.0 ap377792
  • 24.0 ap377799
  • 24.0 ap378014
  • 24.0 ap378119
  • 24.0 ap378140
  • 24.0 ap378142
  • 24.0 ap378153
  • 24.0 ap378165
  • 24.0 ap378168
  • 24.0 ap378227
  • 24.0 ap378259
  • 24.0 ap378372
  • 24.0 ap378415
  • 24.0 ap378419
  • 24.0 ap378437
  • 24.0 ap378509
  • 24.0 ap378545
  • 24.0 ap378581
  • 24.0 ap378585
  • 24.0 ap378823
  • 24.0 ap378904
  • 24.0 ap378952
  • 24.0 ap378966
  • 24.0 ap378987
  • 24.0 ap379080
  • 24.0 ap379085
  • 24.0 ap379091
  • 24.0 ap379140
  • 24.0 ap379152
  • 24.0 ap379167
  • 24.0 ap379168
  • 24.0 ap379187
  • 24.0 ap379331
  • 24.0 ap379411
  • 24.0 ap379427
  • 24.0 ap379482
  • 24.0 ap379531
  • 24.0 ap379535
  • 24.0 ap379565
  • 24.0 ap379587
  • 24.0 ap379600
  • 24.0 ap379606
  • 24.0 ap379608
  • 24.0 ap379611
  • 24.0 ap379616
  • 24.0 ap379627
  • 24.0 ap379635
  • 24.0 ap379694
  • 24.0 ap379701
  • 24.0 ap379752
  • 24.0 ap379760
  • 24.0 ap379762
  • 24.0 ap379764
  • 24.0 ap379780
  • 24.0 ap379781
  • 24.0 ap379782
  • 24.0 ap379830
  • 24.0 ap379839
  • 24.0 ap379848
  • 24.0 ap379855
  • 24.0 ap379874
  • 24.0 ap379884
  • 24.0 ap379889
  • 24.0 ap379892
  • 24.0 ap379903
  • 24.0 ap378203
  • 24.0 ap379008
  • 24.0 ap379795
  • 24.0 ap379838
  • 24.0 ap379847
  • 24.0 ap379890
  • 24.0 ap379921
  • 24.0 ap379925
  • 24.0 ap379934
  • 24.0 ap379957
  • 24.0 ap379963
  • 24.0 ap379972
  • 24.0 ap380059
  • 24.0 ap380099
  • 24.0 ap380109
  • 24.0 ap380137
  • 24.0 ap380143
  • 24.0 ap380161
  • 24.0 ap380176
  • 24.0 ap380180
  • 24.0 ap380181
  • 24.0 ap380187
  • 24.0 ap380196
  • 24.0 ap380204
  • 24.0 ap380239
  • 24.0 ap380249
  • 24.0 ap380256
  • 24.0 ap380264
  • 24.0 ap380269
  • 24.0 ap380270
  • 24.0 ap380281
  • 24.0 ap380282
  • 24.0 ap380355
  • 24.0 ap380371
  • 24.0 ap380375
  • 24.0 ap380396
  • 24.0 ap380450
  • 24.0 ap380465
  • 24.0 ap380473
  • 24.0 ap380501
  • 24.0 ap380506
  • 24.0 ap380543
  • 24.0 ap380581
  • 24.0 ap380595
  • 24.0 ap380637
  • 24.0 ap380692
  • 24.0 ap380758
  • 24.0 ap380762
  • 24.0 ap380766
  • 24.0 ap381358
  • 24.0 ap382200
  • 24.0 ap381767
  • 24.0 ap382744
  • 24.0 ap381657
  • 24.0 ap381609
  • 24.0 ap382951
  • 24.0 ap381848
  • 24.0 ap380849
  • 24.0 ap381809
  • 24.0 ap381826
  • 24.0 ap381622
  • 24.0 ap381654
  • 24.0 ap374211
  • 24.0 ap381002
  • 24.0 ap382750
  • 24.0 ap382039
  • 24.0 ap381874
  • 24.0 ap383534
  • 24.0 ap381775
  • 24.0 ap382916
  • 24.0 ap380939
  • 24.0 ap383002
  • 24.0 ap382206
  • 24.0 ap381247
  • 24.0 ap381666
  • 24.0 ap381825
  • 24.0 ap381952
  • 24.0 ap382277
  • 24.0 ap380936
  • 24.0 ap380985
  • 24.0 ap382468
  • 24.0 ap382094
  • 24.0 ap381971
  • 24.0 ap383536
  • 24.0 ap381970
  • 24.0 ap381271
  • 24.0 ap381292
  • 24.0 ap381621
  • 24.0 ap379049
  • 24.0 ap380840
  • 24.0 ap381600
  • 24.0 ap382526
  • 24.0 ap382462
  • 24.0 ap380613
  • 24.0 ap381596
  • 24.0 ap380779
  • 24.0 ap382615
  • 24.0 ap382170
  • 24.0 ap382164
  • 24.0 ap382189
  • 24.0 ap381357
  • 24.0 ap381348
  • 24.0 ap382495
  • 24.0 ap382042
  • 24.0 ap382441
  • 24.0 ap381575
  • 24.0 ap381936
  • 24.0 ap382994
  • 24.0 ap381623
  • 24.0 ap382236
  • 24.0 ap382676
  • 24.0 ap382673
  • 24.0 ap380998
  • 24.0 ap382045
  • 24.0 ap382167
  • 24.0 ap381975
  • 24.0 ap382668
  • 24.0 ap382053
  • 24.0 ap383710
  • 24.0 ap382740
  • 24.0 ap383459
  • 24.0 ap382692
  • 24.0 ap383737
  • 24.0 ap380045
  • 24.0 ap382195
  • 24.0 ap382057
  • 24.0 ap381243
  • 24.0 ap382160
  • 24.0 ap382445
  • 24.0 ap382246
  • 24.0 ap382958
  • 24.0 ap381854
  • 24.0 ap381604
  • 24.0 ap381091
  • 24.0 ap381079
  • 24.0 ap381527
  • 24.0 ap383772
  • 24.0 ap381004
  • 24.0 ap380737
  • 24.0 ap382253
  • 24.0 ap381721
  • 24.0 ap381322
  • 24.0 ap382098
  • 24.0 ap382677
  • 24.0 ap382169
  • 24.0 ap383696
  • 24.0 ap382258
  • 24.0 ap380751
  • 24.0 ap382262
  • 24.0 ap382267
  • 24.0 ap382192
  • 24.0 ap380128
  • 24.0 ap382656
  • 24.0 ap383779
  • 24.0 ap382194
  • 24.0 ap382691
  • 24.0 ap382372
  • 24.0 ap380771
  • 24.0 ap382155
  • 24.0 ap382484
  • 24.0 ap383902
  • 24.0 ap382362
  • 24.0 ap383788
  • 24.0 ap383771
  • 24.0 ap382836
  • 24.0 ap382240
  • 24.0 ap383700
  • 24.0 ap383597
  • 24.0 ap381108
  • 24.0 ap379012
  • 24.0 ap382709
  • 24.0 ap381078
  • 24.0 ap383505
  • 24.0 ap382977
  • 24.0 ap382912
  • 24.0 ap383569
  • 24.0 ap383105
  • 24.0 ap380537
  • 24.0 ap382935
  • 24.0 ap381616
  • 24.0 ap383519
  • 24.0 ap381410
  • 24.0 ap383573
  • 24.0 ap382959
  • 24.0 ap376010
  • 24.0 ap380051
  • 24.0 ap381506
  • 24.0 ap381732
  • 24.0 ap383492
  • 24.0 ap383089
  • 24.0 ap383172
  • 24.0 ap381624
  • 24.0 ap383547
  • 24.0 ap381584
  • 24.0 ap382945
  • 24.0 ap382594
  • 24.0 ap383494
  • 24.0 ap381611
  • 24.0 ap380739
  • 24.0 ap381574
  • 24.0 ap383390
  • 24.0 ap383538
  • 24.0 ap382838
  • 24.0 ap382252
  • 24.0 ap383518
  • 24.0 ap383326
  • 24.0 ap383463
  • 24.0 ap383391
  • 24.0 ap380052
  • 24.0 ap383352
  • 24.0 ap383064
  • 24.0 ap382488
  • 24.0 ap381615
  • 24.0 ap382952
  • 24.0 ap381055
  • 24.0 ap383466
  • 24.0 ap383178
  • 24.0 ap383515
  • 24.0 ap383681
  • 24.0 ap383377
  • 24.0 ap383327
  • 24.0 ap383123
  • 24.0 ap383346
  • 24.0 ap383331
  • 24.0 ap382993
  • 24.0 ap383147
  • 24.0 ap382487
  • 24.0 ap383170
  • 24.0 ap382929
  • 24.0 ap383717
  • 24.0 ap380782
  • 24.0 ap382954
  • 24.0 ap382527
  • 24.0 ap383754
  • 24.0 ap382969
  • 24.0 ap382965
  • 24.0 ap380970
  • 24.0 ap382515
  • 24.0 ap382463
  • 24.0 ap382976
  • 24.0 ap380837
  • 24.0 ap381878
  • 24.0 ap381031
  • 24.0 ap383338
  • 24.0 ap383119
  • 24.0 ap380802
  • 24.0 ap383168
  • 24.0 ap383297
  • 24.0 ap383188
  • 24.0 ap381285
  • 24.0 ap381257
  • 24.0 ap383247
  • 24.0 ap382186
  • 24.0 ap381418
  • 24.0 ap381515
  • 24.0 ap381570
  • 24.0 ap383511
  • 24.0 ap381367
  • 24.0 ap378603
  • 24.0 ap381366
  • 24.0 ap382456
  • 24.0 ap381412
  • 24.0 ap383567
  • 24.0 ap381548
  • 24.0 ap379397
  • 24.0 ap381518
  • 24.0 ap381341
  • 24.0 ap381498
  • 24.0 ap381507
  • 24.0 ap381339
  • 24.0 ap383302
  • 24.0 ap381398
  • 24.0 ap380775
  • 24.0 ap381526
  • 24.0 ap383908
  • 24.0 ap383821
  • 24.0 ap383781
  • 24.0 ap381334
  • 24.0 ap382689
  • 24.0 ap381215
  • 24.0 ap382646
  • 24.0 ap382493
  • 24.0 ap382300
  • 24.0 ap381001
  • 24.0 ap380697
  • 24.0 ap382412
  • 24.0 ap381305
  • 24.0 ap381523
  • 24.0 ap380535
  • 24.0 ap381543
  • 24.0 ap381088
  • 24.0 ap382631
  • 24.0 ap379046
  • 24.0 ap380167
  • 24.0 ap381308
  • 24.0 ap381340
  • 24.0 ap380783
  • 24.0 ap383603
  • 24.0 ap381300
  • 24.0 ap381805
  • 24.0 ap381733
  • 24.0 ap381384
  • 24.0 ap373571
  • 24.0 ap380042
  • 24.0 ap381840
  • 24.0 ap381951
  • 24.0 ap382856
  • 24.0 ap383524
  • 24.0 ap380047
  • 24.0 ap381857
  • 24.0 ap383520
  • 24.0 ap381956
  • 24.0 ap381655
  • 24.0 ap381569
  • 24.0 ap379954
  • 24.0 ap383716
  • 24.0 ap383775
  • 24.0 ap383838
  • 24.0 ap383905
  • 24.0 ap383909
  • 24.0 ap383933
  • 24.0 ap383943
  • 24.0 ap383952
  • 24.0 ap383955
  • 24.0 ap383968
  • 24.0 ap383979
  • 24.0 ap384000
  • 24.0 ap384115
  • 24.0 ap383989
  • 24.0 ap384002
  • 24.0 ap383782
  • 24.0 ap383992
  • 24.0 ap383973
  • 24.0 ap383309
  • 24.0 ap383514
  • 24.0 ap383815
  • 24.0 ap383899
  • 24.0 ap383983
  • 24.0 ap383994
  • 24.0 ap383998
  • 24.0 ap384015
  • 24.0 ap384023
  • 24.0 ap384034
  • 24.0 ap384120
  • 24.0 ap384127
  • 24.0 ap384129
  • 24.0 ap384134
  • 24.0 ap384137
  • 24.0 ap384138
  • 24.0 ap384145
  • 24.0 ap384151
  • 24.0 ap384163
  • 24.0 ap384173
  • 24.0 ap384177
  • 24.0 ap384179
  • 24.0 ap384185
  • 24.0 ap384191
  • 24.0 ap384194
  • 24.0 ap384209
  • 24.0 ap384211
  • 24.0 ap384220
  • 24.0 ap384234
  • 24.0 ap384309
  • 24.0 ap384317
  • 24.0 ap381051
  • 24.0 ap381081
  • 24.0 ap382225
  • 24.0 ap382717
  • 24.0 ap382824
  • 24.0 ap382841
  • 24.0 ap382857
  • 24.0 ap382873
  • 24.0 ap382894
  • 24.0 ap384232
  • 24.0 ap384239
  • 24.0 ap384320
  • 24.0 ap384339
  • 24.0 ap384342
  • 24.0 ap384344
  • 24.0 ap384345
  • 24.0 ap384351
  • 24.0 ap384357
  • 24.0 ap384358
  • 24.0 ap384361
  • 24.0 ap384365
  • 24.0 ap384367
  • 24.0 ap384372
  • 24.0 ap384374
  • 24.0 ap384377
  • 24.0 ap384386
  • 24.0 ap384389
  • 24.0 ap384395
  • 24.0 ap384423
  • 24.0 ap384428
  • 24.0 ap384429
  • 24.0 ap384430
  • 24.0 ap384431
  • 24.0 ap384434
  • 24.0 ap384439
  • 24.0 ap384441
  • 24.0 ap384446
  • 24.0 ap384448
  • 24.0 ap384449
  • 24.0 ap384455
  • 24.0 ap384462
  • 24.0 ap384468
  • 24.0 ap384471
  • 24.0 ap384474
  • 24.0 ap384480
  • 24.0 ap384543
  • 24.0 ap384589
  • 24.0 ap384594
  • 24.0 ap384620
  • 24.0 ap384622
  • 24.0 ap384627
  • 24.0 ap384629
  • 24.0 ap384636
  • 24.0 ap384641
  • 24.0 ap384643
  • 24.0 ap384650
  • 24.0 ap375650
  • 24.0 ap384382
  • 24.0 ap384383
  • 24.0 ap384457
  • 24.0 ap384591
  • 24.0 ap384653
  • 24.0 ap384654
  • 24.0 ap384656
  • 24.0 ap384658
  • 24.0 ap384740
  • 24.0 ap384745
  • 24.0 ap384747
  • 24.0 ap384755
  • 24.0 ap384772
  • 24.0 ap384781
  • 24.0 ap384793
  • 24.0 ap384800
  • 24.0 ap384801
  • 24.0 ap384870
  • 24.0 ap384874
  • 24.0 ap384876
  • 24.0 ap384879
  • 24.0 ap384884
  • 24.0 ap384898
  • 24.0 ap384901
  • 24.0 ap384908
  • 24.0 ap384921
  • 24.0 ap384925
  • 24.0 ap384930
  • 24.0 ap384931
  • 24.0 ap384942
  • 24.0 ap384947
  • 24.0 ap384957
  • 24.0 ap384962
  • 24.0 ap385048
  • 24.0 ap385054
  • 24.0 ap385057
  • 24.0 ap385058
  • 24.0 ap385071
  • 24.0 ap385085
  • 24.0 ap385088
  • 24.0 ap385104
  • 24.0 ap385107
  • 24.0 ap385111
  • 24.0 ap385114
  • 24.0 ap385115
  • 24.0 ap385134
  • 24.0 ap385136
  • 24.0 ap385146
  • 24.0 ap385149
  • 24.0 ap385233
  • 24.0 ap385235
  • 24.0 ap385238
  • 24.0 ap385240
  • 24.0 ap385241
  • 24.0 ap385242
  • 24.0 ap385244
  • 24.0 ap385247
  • 24.0 ap385249
  • 24.0 ap385250
  • 24.0 ap385251
  • 24.0 ap385252
  • 24.0 ap385253
  • 24.0 ap385254
  • 24.0 ap385255
  • 24.0 ap385256
  • 24.0 ap385259
  • 24.0 ap385265
  • 24.0 ap385266
  • 24.0 ap385267
  • 24.0 ap385268
  • 24.0 ap385269
  • 24.0 ap385272
  • 24.0 ap385275
  • 24.0 ap385276
  • 24.0 ap385277
  • 24.0 ap385278
  • 24.0 ap385280
  • 24.0 ap385282
  • 24.0 ap385274
  • 24.0 ap385281
  • 24.0 ap385286
  • 24.0 ap385287
  • 24.0 ap385289
  • 24.0 ap385283
  • 23.0
  • 23.0 ap380204
  • 23.0 ap380281
  • 23.0 ap380355
  • 23.0 ap380375
  • 23.0 ap380391
  • 23.0 ap380396
  • 23.0 ap366748
  • 23.0 ap374310
  • 23.0 ap375293
  • 23.0 ap371233
  • 23.0 ap381051
  • 23.0 ap365558
  • 23.0 ap379795
  • 23.0 ap373098
  • 23.0 ap364705
  • 23.0 ap375539
  • 23.0 ap382358
  • 23.0 ap374143
  • 23.0 ap367292
  • 23.0 ap375289
  • 23.0 ap375624
  • 23.0 ap375317
  • 23.0 ap362261
  • 23.0 ap382281
  • 23.0 ap367434
  • 23.0 ap363641
  • 23.0 ap376661
  • 23.0 ap382262
  • 23.0 ap380691
  • 23.0 ap383569
  • 23.0 ap368179
  • 23.0 ap375601
  • 23.0 ap382206
  • 23.0 ap383829
  • 23.0 ap377319
  • 23.0 ap381081
  • 23.0 ap363869
  • 23.0 ap367895
  • 23.0 ap383902
  • 23.0 ap383519
  • 23.0 ap375345
  • 23.0 ap374085
  • 23.0 ap367488
  • 23.0 ap382236
  • 23.0 ap363192
  • 23.0 ap371974
  • 23.0 ap367223
  • 23.0 ap373017
  • 23.0 ap373752
  • 23.0 ap373882
  • 23.0 ap373861
  • 23.0 ap365531
  • 23.0 ap373870
  • 23.0 ap372929
  • 23.0 ap373952
  • 23.0 ap374037
  • 23.0 ap368214
  • 23.0 ap366264
  • 23.0 ap373769
  • 23.0 ap383779
  • 23.0 ap374583
  • 23.0 ap373009
  • 23.0 ap371300
  • 23.0 ap374125
  • 23.0 ap367985
  • 23.0 ap364367
  • 23.0 ap362578
  • 23.0 ap373871
  • 23.0 ap380766
  • 23.0 ap365598
  • 23.0 ap380849
  • 23.0 ap373912
  • 23.0 ap366334
  • 23.0 ap374421
  • 23.0 ap380692
  • 23.0 ap380758
  • 23.0 ap374305
  • 23.0 ap380771
  • 23.0 ap367992
  • 23.0 ap374055
  • 23.0 ap367547
  • 23.0 ap368000
  • 23.0 ap366366
  • 23.0 ap365227
  • 23.0 ap372015
  • 23.0 ap372012
  • 23.0 ap374668
  • 23.0 ap383788
  • 23.0 ap351263
  • 23.0 ap374715
  • 23.0 ap374691
  • 23.0 ap370792
  • 23.0 ap364467
  • 23.0 ap365701
  • 23.0 ap374255
  • 23.0 ap381357
  • 23.0 ap374311
  • 23.0 ap374162
  • 23.0 ap363644
  • 23.0 ap373754
  • 23.0 ap373301
  • 23.0 ap373182
  • 23.0 ap374226
  • 23.0 ap377423
  • 23.0 ap369489
  • 23.0 ap373294
  • 23.0 ap383524
  • 23.0 ap383302
  • 23.0 ap375902
  • 23.0 ap376010
  • 23.0 ap382487
  • 23.0 ap371314
  • 23.0 ap371327
  • 23.0 ap371285
  • 23.0 ap371368
  • 23.0 ap371167
  • 23.0 ap374454
  • 23.0 ap383538
  • 23.0 ap374109
  • 23.0 ap374639
  • 23.0 ap371099
  • 23.0 ap369731
  • 23.0 ap371310
  • 23.0 ap374315
  • 23.0 ap374249
  • 23.0 ap374493
  • 23.0 ap374165
  • 23.0 ap374361
  • 23.0 ap373330
  • 23.0 ap369928
  • 23.0 ap374296
  • 23.0 ap371319
  • 23.0 ap374210
  • 23.0 ap372116
  • 23.0 ap371748
  • 23.0 ap374472
  • 23.0 ap372453
  • 23.0 ap371432
  • 23.0 ap372345
  • 23.0 ap371868
  • 23.0 ap372121
  • 23.0 ap383710
  • 23.0 ap372995
  • 23.0 ap373511
  • 23.0 ap372873
  • 23.0 ap370427
  • 23.0 ap371209
  • 23.0 ap355298
  • 23.0 ap371811
  • 23.0 ap373589
  • 23.0 ap366525
  • 23.0 ap381596
  • 23.0 ap383567
  • 23.0 ap372533
  • 23.0 ap372922
  • 23.0 ap370538
  • 23.0 ap371268
  • 23.0 ap383681
  • 23.0 ap374498
  • 23.0 ap373004
  • 23.0 ap371269
  • 23.0 ap371456
  • 23.0 ap366201
  • 23.0 ap360464
  • 23.0 ap362035
  • 23.0 ap375383
  • 23.0 ap375770
  • 23.0 ap372607
  • 23.0 ap371259
  • 23.0 ap374794
  • 23.0 ap366296
  • 23.0 ap374892
  • 23.0 ap367007
  • 23.0 ap365754
  • 23.0 ap374785
  • 23.0 ap352402
  • 23.0 ap372079
  • 23.0 ap366797
  • 23.0 ap366335
  • 23.0 ap375465
  • 23.0 ap374609
  • 23.0 ap381366
  • 23.0 ap370383
  • 23.0 ap371722
  • 23.0 ap362749
  • 23.0 ap367323
  • 23.0 ap374820
  • 23.0 ap369763
  • 23.0 ap381657
  • 23.0 ap368517
  • 23.0 ap372455
  • 23.0 ap365058
  • 23.0 ap370362
  • 23.0 ap381358
  • 23.0 ap374723
  • 23.0 ap375353
  • 23.0 ap375370
  • 23.0 ap380041
  • 23.0 ap361414
  • 23.0 ap368643
  • 23.0 ap379140
  • 23.0 ap379501
  • 23.0 ap377147
  • 23.0 ap379417
  • 23.0 ap372207
  • 23.0 ap368743
  • 23.0 ap370464
  • 23.0 ap353137
  • 23.0 ap373016
  • 23.0 ap364518
  • 23.0 ap361651
  • 23.0 ap379339
  • 23.0 ap374711
  • 23.0 ap371091
  • 23.0 ap370763
  • 23.0 ap366610
  • 23.0 ap371021
  • 23.0 ap366275
  • 23.0 ap370909
  • 23.0 ap381243
  • 23.0 ap381271
  • 23.0 ap379449
  • 23.0 ap371052
  • 23.0 ap381247
  • 23.0 ap383603
  • 23.0 ap380249
  • 23.0 ap382195
  • 23.0 ap373571
  • 23.0 ap382668
  • 23.0 ap382493
  • 23.0 ap380269
  • 23.0 ap364371
  • 23.0 ap383716
  • 23.0 ap383775
  • 23.0 ap383909
  • 23.0 ap383943
  • 23.0 ap383952
  • 23.0 ap383955
  • 23.0 ap383979
  • 23.0 ap383838
  • 23.0 ap384023
  • 23.0 ap383717
  • 23.0 ap383797
  • 23.0 ap383815
  • 23.0 ap383998
  • 23.0 ap384015
  • 23.0 ap384127
  • 23.0 ap384131
  • 23.0 ap384151
  • 23.0 ap384173
  • 23.0 ap384179
  • 23.0 ap384185
  • 23.0 ap384211
  • 23.0 ap384220
  • 23.0 ap384245
  • 23.0 ap384344
  • 23.0 ap363366
  • 23.0 ap364258
  • 23.0 ap365170
  • 23.0 ap365576
  • 23.0 ap365858
  • 23.0 ap366221
  • 23.0 ap366294
  • 23.0 ap365801
  • 23.0 ap366170
  • 23.0 ap364925
  • 23.0 ap366295
  • 23.0 ap366346
  • 23.0 ap366348
  • 23.0 ap364295
  • 23.0 ap364559
  • 23.0 ap366118
  • 23.0 ap366252
  • 23.0 ap363729
  • 23.0 ap365390
  • 23.0 ap364932
  • 23.0 ap365239
  • 23.0 ap365759
  • 23.0 ap366211
  • 23.0 ap366290
  • 23.0 ap365223
  • 23.0 ap366117
  • 23.0 ap365730
  • 23.0 ap366261
  • 23.0 ap365889
  • 23.0 ap366181
  • 23.0 ap365115
  • 23.0 ap364048
  • 23.0 ap366298
  • 23.0 ap364699
  • 23.0 ap345032
  • 23.0 ap362683
  • 23.0 ap363361
  • 23.0 ap352969
  • 23.0 ap359103
  • 23.0 ap366375
  • 23.0 ap366912
  • 23.0 ap367109
  • 23.0 ap366397
  • 23.0 ap354354
  • 23.0 ap349850
  • 23.0 ap366880
  • 23.0 ap360007
  • 23.0 ap366744
  • 23.0 ap366747
  • 23.0 ap367206
  • 23.0 ap362771
  • 23.0 ap367291
  • 23.0 ap366916
  • 23.0 ap367207
  • 23.0 ap363363
  • 23.0 ap366959
  • 23.0 ap351530
  • 23.0 ap361116
  • 23.0 ap366898
  • 23.0 ap361533
  • 23.0 ap366827
  • 23.0 ap352962
  • 23.0 ap369295
  • 23.0 ap366358
  • 23.0 ap366677
  • 23.0 ap366882
  • 23.0 ap366972
  • 23.0 ap366486
  • 23.0 ap366803
  • 23.0 ap358290
  • 23.0 ap363265
  • 23.0 ap363128
  • 23.0 ap366701
  • 23.0 ap366373
  • 23.0 ap369674
  • 23.0 ap369206
  • 23.0 ap369065
  • 23.0 ap368327
  • 23.0 ap368632
  • 23.0 ap367290
  • 23.0 ap369302
  • 23.0 ap368419
  • 23.0 ap369501
  • 23.0 ap369219
  • 23.0 ap368604
  • 23.0 ap368706
  • 23.0 ap368461
  • 23.0 ap368612
  • 23.0 ap368552
  • 23.0 ap369529
  • 23.0 ap369748
  • 23.0 ap368218
  • 23.0 ap368913
  • 23.0 ap369607
  • 23.0 ap369693
  • 23.0 ap368510
  • 23.0 ap368445
  • 23.0 ap369106
  • 23.0 ap369257
  • 23.0 ap368987
  • 23.0 ap369150
  • 23.0 ap368695
  • 23.0 ap368167
  • 23.0 ap370361
  • 23.0 ap367969
  • 23.0 ap367367
  • 23.0 ap369434
  • 23.0 ap369132
  • 23.0 ap367678
  • 23.0 ap367517
  • 23.0 ap369863
  • 23.0 ap369227
  • 23.0 ap369454
  • 23.0 ap367332
  • 23.0 ap367794
  • 23.0 ap369934
  • 23.0 ap370196
  • 23.0 ap367358
  • 23.0 ap367453
  • 23.0 ap367732
  • 23.0 ap367646
  • 23.0 ap367874
  • 23.0 ap370344
  • 23.0 ap367524
  • 23.0 ap368153
  • 23.0 ap368087
  • 23.0 ap368180
  • 23.0 ap367726
  • 23.0 ap370103
  • 23.0 ap367396
  • 23.0 ap367340
  • 23.0 ap369855
  • 23.0 ap368140
  • 23.0 ap367998
  • 23.0 ap372337
  • 23.0 ap372706
  • 23.0 ap368032
  • 23.0 ap367906
  • 23.0 ap370138
  • 23.0 ap372380
  • 23.0 ap372246
  • 23.0 ap370193
  • 23.0 ap372643
  • 23.0 ap372560
  • 23.0 ap367513
  • 23.0 ap369931
  • 23.0 ap368195
  • 23.0 ap372243
  • 23.0 ap368216
  • 23.0 ap369929
  • 23.0 ap367365
  • 23.0 ap367782
  • 23.0 ap367675
  • 23.0 ap372757
  • 23.0 ap372389
  • 23.0 ap372799
  • 23.0 ap372641
  • 23.0 ap371050
  • 23.0 ap372338
  • 23.0 ap372422
  • 23.0 ap372033
  • 23.0 ap372178
  • 23.0 ap371516
  • 23.0 ap372351
  • 23.0 ap372708
  • 23.0 ap372100
  • 23.0 ap372504
  • 23.0 ap371961
  • 23.0 ap370590
  • 23.0 ap370544
  • 23.0 ap372599
  • 23.0 ap371836
  • 23.0 ap372674
  • 23.0 ap370911
  • 23.0 ap370817
  • 23.0 ap372043
  • 23.0 ap370802
  • 23.0 ap370437
  • 23.0 ap370926
  • 23.0 ap370884
  • 23.0 ap371366
  • 23.0 ap370952
  • 23.0 ap371281
  • 23.0 ap371436
  • 23.0 ap371153
  • 23.0 ap371033
  • 23.0 ap371977
  • 23.0 ap371627
  • 23.0 ap371155
  • 23.0 ap371295
  • 23.0 ap372152
  • 23.0 ap371760
  • 23.0 ap370627
  • 23.0 ap371583
  • 23.0 ap371546
  • 23.0 ap371770
  • 23.0 ap371437
  • 23.0 ap372091
  • 23.0 ap372163
  • 23.0 ap370737
  • 23.0 ap370908
  • 23.0 ap370465
  • 23.0 ap371587
  • 23.0 ap375133
  • 23.0 ap375266
  • 23.0 ap372099
  • 23.0 ap375254
  • 23.0 ap372016
  • 23.0 ap372177
  • 23.0 ap375242
  • 23.0 ap375291
  • 23.0 ap371775
  • 23.0 ap375688
  • 23.0 ap375382
  • 23.0 ap375634
  • 23.0 ap375449
  • 23.0 ap375321
  • 23.0 ap375685
  • 23.0 ap375509
  • 23.0 ap375719
  • 23.0 ap375720
  • 23.0 ap375464
  • 23.0 ap375625
  • 23.0 ap375709
  • 23.0 ap375343
  • 23.0 ap375533
  • 23.0 ap375672
  • 23.0 ap375545
  • 23.0 ap375264
  • 23.0 ap375661
  • 23.0 ap375646
  • 23.0 ap375238
  • 23.0 ap375304
  • 23.0 ap375097
  • 23.0 ap373664
  • 23.0 ap373562
  • 23.0 ap372932
  • 23.0 ap374339
  • 23.0 ap374265
  • 23.0 ap374230
  • 23.0 ap374430
  • 23.0 ap373102
  • 23.0 ap375655
  • 23.0 ap373777
  • 23.0 ap374113
  • 23.0 ap373015
  • 23.0 ap374971
  • 23.0 ap374803
  • 23.0 ap372974
  • 23.0 ap374312
  • 23.0 ap374354
  • 23.0 ap375018
  • 23.0 ap373018
  • 23.0 ap374506
  • 23.0 ap374588
  • 23.0 ap373950
  • 23.0 ap375038
  • 23.0 ap373480
  • 23.0 ap374238
  • 23.0 ap372845
  • 23.0 ap373564
  • 23.0 ap373482
  • 23.0 ap372994
  • 23.0 ap373137
  • 23.0 ap374977
  • 23.0 ap373034
  • 23.0 ap374324
  • 23.0 ap374031
  • 23.0 ap374093
  • 23.0 ap374507
  • 23.0 ap373684
  • 23.0 ap374356
  • 23.0 ap373820
  • 23.0 ap373104
  • 23.0 ap373954
  • 23.0 ap373644
  • 23.0 ap373899
  • 23.0 ap374822
  • 23.0 ap374254
  • 23.0 ap375069
  • 23.0 ap373918
  • 23.0 ap374557
  • 23.0 ap372854
  • 23.0 ap373647
  • 23.0 ap374838
  • 23.0 ap374330
  • 23.0 ap374799
  • 23.0 ap374428
  • 23.0 ap375936
  • 23.0 ap375862
  • 23.0 ap376041
  • 23.0 ap374895
  • 23.0 ap375793
  • 23.0 ap373046
  • 23.0 ap376181
  • 23.0 ap375003
  • 23.0 ap373539
  • 23.0 ap373111
  • 23.0 ap375734
  • 23.0 ap375743
  • 23.0 ap376087
  • 23.0 ap376179
  • 23.0 ap376100
  • 23.0 ap373299
  • 23.0 ap373303
  • 23.0 ap375908
  • 23.0 ap376356
  • 23.0 ap375984
  • 23.0 ap373318
  • 23.0 ap375865
  • 23.0 ap376038
  • 23.0 ap373257
  • 23.0 ap376218
  • 23.0 ap373438
  • 23.0 ap373212
  • 23.0 ap373271
  • 23.0 ap376509
  • 23.0 ap376252
  • 23.0 ap376602
  • 23.0 ap376752
  • 23.0 ap373452
  • 23.0 ap376429
  • 23.0 ap376860
  • 23.0 ap376710
  • 23.0 ap376410
  • 23.0 ap376298
  • 23.0 ap373189
  • 23.0 ap376426
  • 23.0 ap376873
  • 23.0 ap376668
  • 23.0 ap376407
  • 23.0 ap376670
  • 23.0 ap376485
  • 23.0 ap376652
  • 23.0 ap376523
  • 23.0 ap376656
  • 23.0 ap376620
  • 23.0 ap376531
  • 23.0 ap377412
  • 23.0 ap376762
  • 23.0 ap376541
  • 23.0 ap376671
  • 23.0 ap376844
  • 23.0 ap376701
  • 23.0 ap376614
  • 23.0 ap377578
  • 23.0 ap377496
  • 23.0 ap377508
  • 23.0 ap376416
  • 23.0 ap377778
  • 23.0 ap377516
  • 23.0 ap377644
  • 23.0 ap377755
  • 23.0 ap377540
  • 23.0 ap377497
  • 23.0 ap377523
  • 23.0 ap377581
  • 23.0 ap377727
  • 23.0 ap378436
  • 23.0 ap377515
  • 23.0 ap377674
  • 23.0 ap378400
  • 23.0 ap377566
  • 23.0 ap377494
  • 23.0 ap377799
  • 23.0 ap377779
  • 23.0 ap378165
  • 23.0 ap378332
  • 23.0 ap377757
  • 23.0 ap377908
  • 23.0 ap377802
  • 23.0 ap377999
  • 23.0 ap377984
  • 23.0 ap378134
  • 23.0 ap378545
  • 23.0 ap378863
  • 23.0 ap378882
  • 23.0 ap379016
  • 23.0 ap378599
  • 23.0 ap378218
  • 23.0 ap378164
  • 23.0 ap379085
  • 23.0 ap378880
  • 23.0 ap378862
  • 23.0 ap378425
  • 23.0 ap378259
  • 23.0 ap378970
  • 23.0 ap378153
  • 23.0 ap378585
  • 23.0 ap378509
  • 23.0 ap378393
  • 23.0 ap378079
  • 23.0 ap378404
  • 23.0 ap378471
  • 23.0 ap378966
  • 23.0 ap379049
  • 23.0 ap379012
  • 23.0 ap379080
  • 23.0 ap378865
  • 23.0 ap378140
  • 23.0 ap378574
  • 23.0 ap378440
  • 23.0 ap378823
  • 23.0 ap378603
  • 23.0 ap379397
  • 23.0 ap378953
  • 23.0 ap378866
  • 23.0 ap379008
  • 23.0 ap378924
  • 23.0 ap378581
  • 23.0 ap378999
  • 23.0 ap378161
  • 23.0 ap378080
  • 23.0 ap380161
  • 23.0 ap379046
  • 23.0 ap379874
  • 23.0 ap378391
  • 23.0 ap380239
  • 23.0 ap379772
  • 23.0 ap378419
  • 23.0 ap378257
  • 23.0 ap379838
  • 23.0 ap379531
  • 23.0 ap379888
  • 23.0 ap379167
  • 23.0 ap378485
  • 23.0 ap380167
  • 23.0 ap380099
  • 23.0 ap379847
  • 23.0 ap379098
  • 23.0 ap379972
  • 23.0 ap379438
  • 23.0 ap380143
  • 23.0 ap380187
  • 23.0 ap379427
  • 23.0 ap380045
  • 23.0 ap379848
  • 23.0 ap377384
  • 23.0 ap376984
  • 23.0 ap379890
  • 23.0 ap380128
  • 23.0 ap377149
  • 23.0 ap380446
  • 23.0 ap379694
  • 23.0 ap380270
  • 23.0 ap379780
  • 23.0 ap380371
  • 23.0 ap379752
  • 23.0 ap380137
  • 23.0 ap376989
  • 23.0 ap380180
  • 23.0 ap380042
  • 23.0 ap376935
  • 23.0 ap379487
  • 23.0 ap379934
  • 23.0 ap377023
  • 23.0 ap379833
  • 23.0 ap380473
  • 23.0 ap380535
  • 23.0 ap377068
  • 23.0 ap379853
  • 23.0 ap380998
  • 23.0 ap380626
  • 23.0 ap377079
  • 23.0 ap377329
  • 23.0 ap381091
  • 23.0 ap380751
  • 23.0 ap380543
  • 23.0 ap381270
  • 23.0 ap380817
  • 23.0 ap381055
  • 23.0 ap380506
  • 23.0 ap381275
  • 23.0 ap380739
  • 23.0 ap380783
  • 23.0 ap380970
  • 23.0 ap380537
  • 23.0 ap380697
  • 23.0 ap380936
  • 23.0 ap380486
  • 23.0 ap380512
  • 23.0 ap380737
  • 23.0 ap381118
  • 23.0 ap381072
  • 23.0 ap381584
  • 23.0 ap381088
  • 23.0 ap382053
  • 23.0 ap381523
  • 23.0 ap381732
  • 23.0 ap382372
  • 23.0 ap382252
  • 23.0 ap383002
  • 23.0 ap382857
  • 23.0 ap382846
  • 23.0 ap382253
  • 23.0 ap381322
  • 23.0 ap382057
  • 23.0 ap382386
  • 23.0 ap382709
  • 23.0 ap382954
  • 23.0 ap382225
  • 23.0 ap382717
  • 23.0 ap381840
  • 23.0 ap381594
  • 23.0 ap381410
  • 23.0 ap382463
  • 23.0 ap382198
  • 23.0 ap381526
  • 23.0 ap381498
  • 23.0 ap381418
  • 23.0 ap383573
  • 23.0 ap382838
  • 23.0 ap381609
  • 23.0 ap381548
  • 23.0 ap383706
  • 23.0 ap382945
  • 23.0 ap382300
  • 23.0 ap382615
  • 23.0 ap382977
  • 23.0 ap384345
  • 23.0 ap383547
  • 23.0 ap382158
  • 23.0 ap382240
  • 23.0 ap383515
  • 23.0 ap383754
  • 23.0 ap381961
  • 23.0 ap382526
  • 23.0 ap382951
  • 23.0 ap382824
  • 23.0 ap382993
  • 23.0 ap383536
  • 23.0 ap383247
  • 23.0 ap383170
  • 23.0 ap382032
  • 23.0 ap382992
  • 23.0 ap383365
  • 23.0 ap383772
  • 23.0 ap381569
  • 23.0 ap381348
  • 23.0 ap382192
  • 23.0 ap381367
  • 23.0 ap383352
  • 23.0 ap383597
  • 23.0 ap381622
  • 23.0 ap383518
  • 23.0 ap383492
  • 23.0 ap383309
  • 23.0 ap383064
  • 23.0 ap383168
  • 23.0 ap382362
  • 23.0 ap382434
  • 23.0 ap384431
  • 23.0 ap383514
  • 23.0 ap384441
  • 23.0 ap383994
  • 23.0 ap384034
  • 23.0 ap384120
  • 23.0 ap384134
  • 23.0 ap384191
  • 23.0 ap384234
  • 23.0 ap384309
  • 23.0 ap384317
  • 23.0 ap342846
  • 23.0 ap352264
  • 23.0 ap352954
  • 23.0 ap355907
  • 23.0 ap356141
  • 23.0 ap356752
  • 23.0 ap358046
  • 23.0 ap359922
  • 23.0 ap361443
  • 23.0 ap361930
  • 23.0 ap362693
  • 23.0 ap363247
  • 23.0 ap363431
  • 23.0 ap363672
  • 23.0 ap363710
  • 23.0 ap364519
  • 23.0 ap364532
  • 23.0 ap364634
  • 23.0 ap364753
  • 23.0 ap364956
  • 23.0 ap365040
  • 23.0 ap365155
  • 23.0 ap365646
  • 23.0 ap365661
  • 23.0 ap365689
  • 23.0 ap365744
  • 23.0 ap365770
  • 23.0 ap365773
  • 23.0 ap365798
  • 23.0 ap365886
  • 23.0 ap365900
  • 23.0 ap365946
  • 23.0 ap365979
  • 23.0 ap365983
  • 23.0 ap365984
  • 23.0 ap366120
  • 23.0 ap366247
  • 23.0 ap366395
  • 23.0 ap366398
  • 23.0 ap366411
  • 23.0 ap366443
  • 23.0 ap366661
  • 23.0 ap366684
  • 23.0 ap366835
  • 23.0 ap366836
  • 23.0 ap366842
  • 23.0 ap366879
  • 23.0 ap366905
  • 23.0 ap366940
  • 23.0 ap366967
  • 23.0 ap366968
  • 23.0 ap366982
  • 23.0 ap366984
  • 23.0 ap366986
  • 23.0 ap367006
  • 23.0 ap367014
  • 23.0 ap367112
  • 23.0 ap367113
  • 23.0 ap367129
  • 23.0 ap367196
  • 23.0 ap367222
  • 23.0 ap367227
  • 23.0 ap367233
  • 23.0 ap367263
  • 23.0 ap367307
  • 23.0 ap367325
  • 23.0 ap367356
  • 23.0 ap367366
  • 23.0 ap367413
  • 23.0 ap367419
  • 23.0 ap367436
  • 23.0 ap367487
  • 23.0 ap367647
  • 23.0 ap367781
  • 23.0 ap367810
  • 23.0 ap367827
  • 23.0 ap367893
  • 23.0 ap367991
  • 23.0 ap368352
  • 23.0 ap368437
  • 23.0 ap368458
  • 23.0 ap368485
  • 23.0 ap368590
  • 23.0 ap368605
  • 23.0 ap368634
  • 23.0 ap368651
  • 23.0 ap368682
  • 23.0 ap368725
  • 23.0 ap368827
  • 23.0 ap368830
  • 23.0 ap368854
  • 23.0 ap368933
  • 23.0 ap369012
  • 23.0 ap369047
  • 23.0 ap369048
  • 23.0 ap369052
  • 23.0 ap369078
  • 23.0 ap369103
  • 23.0 ap369127
  • 23.0 ap369136
  • 23.0 ap369179
  • 23.0 ap369211
  • 23.0 ap369276
  • 23.0 ap369300
  • 23.0 ap369316
  • 23.0 ap369469
  • 23.0 ap369521
  • 23.0 ap369535
  • 23.0 ap369580
  • 23.0 ap369595
  • 23.0 ap369619
  • 23.0 ap369623
  • 23.0 ap369624
  • 23.0 ap369675
  • 23.0 ap369680
  • 23.0 ap369702
  • 23.0 ap369710
  • 23.0 ap369724
  • 23.0 ap369757
  • 23.0 ap369770
  • 23.0 ap369775
  • 23.0 ap369779
  • 23.0 ap369783
  • 23.0 ap369784
  • 23.0 ap369877
  • 23.0 ap369878
  • 23.0 ap369883
  • 23.0 ap369884
  • 23.0 ap369885
  • 23.0 ap369899
  • 23.0 ap369902
  • 23.0 ap369903
  • 23.0 ap369991
  • 23.0 ap369997
  • 23.0 ap370017
  • 23.0 ap370036
  • 23.0 ap370040
  • 23.0 ap370085
  • 23.0 ap370093
  • 23.0 ap370147
  • 23.0 ap370194
  • 23.0 ap370199
  • 23.0 ap370218
  • 23.0 ap370222
  • 23.0 ap370244
  • 23.0 ap370249
  • 23.0 ap370300
  • 23.0 ap370307
  • 23.0 ap370326
  • 23.0 ap370328
  • 23.0 ap370347
  • 23.0 ap370479
  • 23.0 ap370537
  • 23.0 ap370539
  • 23.0 ap370578
  • 23.0 ap370620
  • 23.0 ap370662
  • 23.0 ap370720
  • 23.0 ap370735
  • 23.0 ap370801
  • 23.0 ap370907
  • 23.0 ap370918
  • 23.0 ap370935
  • 23.0 ap371056
  • 23.0 ap371080
  • 23.0 ap371125
  • 23.0 ap371151
  • 23.0 ap371254
  • 23.0 ap371301
  • 23.0 ap371423
  • 23.0 ap371490
  • 23.0 ap371506
  • 23.0 ap371529
  • 23.0 ap371539
  • 23.0 ap371547
  • 23.0 ap371557
  • 23.0 ap371565
  • 23.0 ap371582
  • 23.0 ap371634
  • 23.0 ap371680
  • 23.0 ap371687
  • 23.0 ap371721
  • 23.0 ap371733
  • 23.0 ap371768
  • 23.0 ap371772
  • 23.0 ap371829
  • 23.0 ap371886
  • 23.0 ap371917
  • 23.0 ap371922
  • 23.0 ap371945
  • 23.0 ap371996
  • 23.0 ap372011
  • 23.0 ap372077
  • 23.0 ap372286
  • 23.0 ap372293
  • 23.0 ap372343
  • 23.0 ap372432
  • 23.0 ap372436
  • 23.0 ap372475
  • 23.0 ap372502
  • 23.0 ap372505
  • 23.0 ap372508
  • 23.0 ap372510
  • 23.0 ap372516
  • 23.0 ap372561
  • 23.0 ap372610
  • 23.0 ap372617
  • 23.0 ap372633
  • 23.0 ap372655
  • 23.0 ap372692
  • 23.0 ap372796
  • 23.0 ap372890
  • 23.0 ap372910
  • 23.0 ap372942
  • 23.0 ap372943
  • 23.0 ap372989
  • 23.0 ap373001
  • 23.0 ap373047
  • 23.0 ap373097
  • 23.0 ap373146
  • 23.0 ap373172
  • 23.0 ap373180
  • 23.0 ap373197
  • 23.0 ap373239
  • 23.0 ap373261
  • 23.0 ap373284
  • 23.0 ap373300
  • 23.0 ap373332
  • 23.0 ap373336
  • 23.0 ap373339
  • 23.0 ap373340
  • 23.0 ap373392
  • 23.0 ap373412
  • 23.0 ap373521
  • 23.0 ap373534
  • 23.0 ap373565
  • 23.0 ap373584
  • 23.0 ap373649
  • 23.0 ap373711
  • 23.0 ap373717
  • 23.0 ap373783
  • 23.0 ap373821
  • 23.0 ap373872
  • 23.0 ap373881
  • 23.0 ap373914
  • 23.0 ap373924
  • 23.0 ap374144
  • 23.0 ap374145
  • 23.0 ap374211
  • 23.0 ap374270
  • 23.0 ap374286
  • 23.0 ap374414
  • 23.0 ap374530
  • 23.0 ap374548
  • 23.0 ap374600
  • 23.0 ap374605
  • 23.0 ap374641
  • 23.0 ap374643
  • 23.0 ap374695
  • 23.0 ap374786
  • 23.0 ap374829
  • 23.0 ap374832
  • 23.0 ap374869
  • 23.0 ap374917
  • 23.0 ap374935
  • 23.0 ap374943
  • 23.0 ap374956
  • 23.0 ap375004
  • 23.0 ap375021
  • 23.0 ap375036
  • 23.0 ap375039
  • 23.0 ap375041
  • 23.0 ap375125
  • 23.0 ap375153
  • 23.0 ap375205
  • 23.0 ap375207
  • 23.0 ap375210
  • 23.0 ap375214
  • 23.0 ap375240
  • 23.0 ap375260
  • 23.0 ap375270
  • 23.0 ap375273
  • 23.0 ap375335
  • 23.0 ap375342
  • 23.0 ap375351
  • 23.0 ap375398
  • 23.0 ap375409
  • 23.0 ap375412
  • 23.0 ap375414
  • 23.0 ap375421
  • 23.0 ap375425
  • 23.0 ap375430
  • 23.0 ap375432
  • 23.0 ap375453
  • 23.0 ap375466
  • 23.0 ap375469
  • 23.0 ap375476
  • 23.0 ap375484
  • 23.0 ap375488
  • 23.0 ap375489
  • 23.0 ap375502
  • 23.0 ap375514
  • 23.0 ap375518
  • 23.0 ap375603
  • 23.0 ap375700
  • 23.0 ap375711
  • 23.0 ap375730
  • 23.0 ap375748
  • 23.0 ap375756
  • 23.0 ap375757
  • 23.0 ap375804
  • 23.0 ap375828
  • 23.0 ap375849
  • 23.0 ap375860
  • 23.0 ap375944
  • 23.0 ap375949
  • 23.0 ap375950
  • 23.0 ap375959
  • 23.0 ap375962
  • 23.0 ap375982
  • 23.0 ap375989
  • 23.0 ap375990
  • 23.0 ap375996
  • 23.0 ap376000
  • 23.0 ap376001
  • 23.0 ap376012
  • 23.0 ap376024
  • 23.0 ap376042
  • 23.0 ap376099
  • 23.0 ap376140
  • 23.0 ap376156
  • 23.0 ap376189
  • 23.0 ap376213
  • 23.0 ap376220
  • 23.0 ap376267
  • 23.0 ap376308
  • 23.0 ap376317
  • 23.0 ap376340
  • 23.0 ap376341
  • 23.0 ap376384
  • 23.0 ap376414
  • 23.0 ap376445
  • 23.0 ap376450
  • 23.0 ap376486
  • 23.0 ap376507
  • 23.0 ap376512
  • 23.0 ap376529
  • 23.0 ap376613
  • 23.0 ap376622
  • 23.0 ap376664
  • 23.0 ap376666
  • 23.0 ap376695
  • 23.0 ap376696
  • 23.0 ap376699
  • 23.0 ap376702
  • 23.0 ap376704
  • 23.0 ap376721
  • 23.0 ap376722
  • 23.0 ap376736
  • 23.0 ap376787
  • 23.0 ap376798
  • 23.0 ap376802
  • 23.0 ap376809
  • 23.0 ap376818
  • 23.0 ap376820
  • 23.0 ap376842
  • 23.0 ap376878
  • 23.0 ap376889
  • 23.0 ap376934
  • 23.0 ap376945
  • 23.0 ap376956
  • 23.0 ap376979
  • 23.0 ap377012
  • 23.0 ap377033
  • 23.0 ap377050
  • 23.0 ap377091
  • 23.0 ap377109
  • 23.0 ap377120
  • 23.0 ap377163
  • 23.0 ap377175
  • 23.0 ap377177
  • 23.0 ap377229
  • 23.0 ap377378
  • 23.0 ap377399
  • 23.0 ap377485
  • 23.0 ap377517
  • 23.0 ap377538
  • 23.0 ap377555
  • 23.0 ap377569
  • 23.0 ap377628
  • 23.0 ap377630
  • 23.0 ap377651
  • 23.0 ap377667
  • 23.0 ap377670
  • 23.0 ap377687
  • 23.0 ap377718
  • 23.0 ap377723
  • 23.0 ap377737
  • 23.0 ap377743
  • 23.0 ap377751
  • 23.0 ap377868
  • 23.0 ap377878
  • 23.0 ap377888
  • 23.0 ap377913
  • 23.0 ap377966
  • 23.0 ap377983
  • 23.0 ap378010
  • 23.0 ap378014
  • 23.0 ap378019
  • 23.0 ap378029
  • 23.0 ap378051
  • 23.0 ap378070
  • 23.0 ap378087
  • 23.0 ap378122
  • 23.0 ap378141
  • 23.0 ap378142
  • 23.0 ap378144
  • 23.0 ap378150
  • 23.0 ap378154
  • 23.0 ap378168
  • 23.0 ap378178
  • 23.0 ap378227
  • 23.0 ap378234
  • 23.0 ap378242
  • 23.0 ap378248
  • 23.0 ap378258
  • 23.0 ap378372
  • 23.0 ap378383
  • 23.0 ap378390
  • 23.0 ap378415
  • 23.0 ap378437
  • 23.0 ap378481
  • 23.0 ap378506
  • 23.0 ap378535
  • 23.0 ap378553
  • 23.0 ap378575
  • 23.0 ap378595
  • 23.0 ap378818
  • 23.0 ap378827
  • 23.0 ap378886
  • 23.0 ap378902
  • 23.0 ap378913
  • 23.0 ap378920
  • 23.0 ap378952
  • 23.0 ap378976
  • 23.0 ap378987
  • 23.0 ap378995
  • 23.0 ap379069
  • 23.0 ap379091
  • 23.0 ap379105
  • 23.0 ap379112
  • 23.0 ap379122
  • 23.0 ap379152
  • 23.0 ap379168
  • 23.0 ap379187
  • 23.0 ap379190
  • 23.0 ap379199
  • 23.0 ap379329
  • 23.0 ap379331
  • 23.0 ap379346
  • 23.0 ap379373
  • 23.0 ap379378
  • 23.0 ap379389
  • 23.0 ap379390
  • 23.0 ap379391
  • 23.0 ap379395
  • 23.0 ap379411
  • 23.0 ap379423
  • 23.0 ap379474
  • 23.0 ap379475
  • 23.0 ap379482
  • 23.0 ap379511
  • 23.0 ap379515
  • 23.0 ap379532
  • 23.0 ap379533
  • 23.0 ap379535
  • 23.0 ap379565
  • 23.0 ap379600
  • 23.0 ap379616
  • 23.0 ap379627
  • 23.0 ap379635
  • 23.0 ap379781
  • 23.0 ap379782
  • 23.0 ap379830
  • 23.0 ap379839
  • 23.0 ap379855
  • 23.0 ap379889
  • 23.0 ap379903
  • 23.0 ap379921
  • 23.0 ap379925
  • 23.0 ap379957
  • 23.0 ap379963
  • 23.0 ap380109
  • 23.0 ap380181
  • 23.0 ap380196
  • 23.0 ap380256
  • 23.0 ap380264
  • 23.0 ap380282
  • 23.0 ap380465
  • 23.0 ap380501
  • 23.0 ap380581
  • 23.0 ap380613
  • 23.0 ap380620
  • 23.0 ap380635
  • 23.0 ap380637
  • 23.0 ap380762
  • 23.0 ap380775
  • 23.0 ap380782
  • 23.0 ap380802
  • 23.0 ap380840
  • 23.0 ap380939
  • 23.0 ap381001
  • 23.0 ap381004
  • 23.0 ap381047
  • 23.0 ap381078
  • 23.0 ap381108
  • 23.0 ap381128
  • 23.0 ap381215
  • 23.0 ap381257
  • 23.0 ap381285
  • 23.0 ap381292
  • 23.0 ap381300
  • 23.0 ap381305
  • 23.0 ap381308
  • 23.0 ap381334
  • 23.0 ap381339
  • 23.0 ap381384
  • 23.0 ap381385
  • 23.0 ap381398
  • 23.0 ap381412
  • 23.0 ap381507
  • 23.0 ap381518
  • 23.0 ap381527
  • 23.0 ap381543
  • 23.0 ap381570
  • 23.0 ap381575
  • 23.0 ap381600
  • 23.0 ap381611
  • 23.0 ap381615
  • 23.0 ap381616
  • 23.0 ap381621
  • 23.0 ap381623
  • 23.0 ap381624
  • 23.0 ap381654
  • 23.0 ap381666
  • 23.0 ap381734
  • 23.0 ap381775
  • 23.0 ap381809
  • 23.0 ap381825
  • 23.0 ap381826
  • 23.0 ap381854
  • 23.0 ap381874
  • 23.0 ap381878
  • 23.0 ap381936
  • 23.0 ap381952
  • 23.0 ap381956
  • 23.0 ap381970
  • 23.0 ap381971
  • 23.0 ap381975
  • 23.0 ap382039
  • 23.0 ap382042
  • 23.0 ap382045
  • 23.0 ap382098
  • 23.0 ap382155
  • 23.0 ap382160
  • 23.0 ap382164
  • 23.0 ap382167
  • 23.0 ap382170
  • 23.0 ap382189
  • 23.0 ap382194
  • 23.0 ap382231
  • 23.0 ap382267
  • 23.0 ap382277
  • 23.0 ap382412
  • 23.0 ap382441
  • 23.0 ap382445
  • 23.0 ap382474
  • 23.0 ap382484
  • 23.0 ap382488
  • 23.0 ap382527
  • 23.0 ap382594
  • 23.0 ap382631
  • 23.0 ap382656
  • 23.0 ap382673
  • 23.0 ap382676
  • 23.0 ap382677
  • 23.0 ap382691
  • 23.0 ap382692
  • 23.0 ap382703
  • 23.0 ap382740
  • 23.0 ap382750
  • 23.0 ap382836
  • 23.0 ap382841
  • 23.0 ap382873
  • 23.0 ap382894
  • 23.0 ap382912
  • 23.0 ap382929
  • 23.0 ap382935
  • 23.0 ap382965
  • 23.0 ap382969
  • 23.0 ap382976
  • 23.0 ap382994
  • 23.0 ap383105
  • 23.0 ap383123
  • 23.0 ap383147
  • 23.0 ap383178
  • 23.0 ap383188
  • 23.0 ap383297
  • 23.0 ap383326
  • 23.0 ap383327
  • 23.0 ap383331
  • 23.0 ap383346
  • 23.0 ap383377
  • 23.0 ap383455
  • 23.0 ap383459
  • 23.0 ap383463
  • 23.0 ap383494
  • 23.0 ap383498
  • 23.0 ap383511
  • 23.0 ap383520
  • 23.0 ap383700
  • 23.0 ap383821
  • 23.0 ap384239
  • 23.0 ap384339
  • 23.0 ap384351
  • 23.0 ap384361
  • 23.0 ap384367
  • 23.0 ap384389
  • 23.0 ap384395
  • 23.0 ap384428
  • 23.0 ap384429
  • 23.0 ap384434
  • 23.0 ap384448
  • 23.0 ap384471
  • 23.0 ap384474
  • 23.0 ap384543
  • 23.0 ap384622
  • 23.0 ap384629
  • 23.0 ap384639
  • 23.0 ap384643
  • 23.0 ap384650
  • 23.0 ap384591
  • 23.0 ap384745
  • 23.0 ap384876
  • 23.0 ap384901
  • 23.0 ap384930
  • 23.0 ap384931
  • 23.0 ap385048
  • 23.0 ap385072
  • 23.0 ap384382
  • 23.0 ap384383
  • 23.0 ap384457
  • 23.0 ap384761
  • 23.0 ap384772
  • 23.0 ap384793
  • 23.0 ap384800
  • 23.0 ap384801
  • 23.0 ap384879
  • 23.0 ap384898
  • 23.0 ap384908
  • 23.0 ap384921
  • 23.0 ap384947
  • 23.0 ap384957
  • 23.0 ap385046
  • 23.0 ap385054
  • 23.0 ap385071
  • 23.0 ap385085
  • 23.0 ap385088
  • 23.0 ap385104
  • 23.0 ap385107
  • 23.0 ap385111
  • 23.0 ap385115
  • 23.0 ap385117
  • 23.0 ap385136
  • 23.0 ap385146
  • 23.0 ap385149
  • 23.0 ap385233
  • 23.0 ap385236
  • 23.0 ap385238
  • 23.0 ap385242
  • 23.0 ap385244
  • 23.0 ap385247
  • 23.0 ap385251
  • 23.0 ap385252
  • 23.0 ap385253
  • 23.0 ap385254
  • 23.0 ap385256
  • 23.0 ap385266
  • 23.0 ap385267
  • 23.0 ap385268
  • 23.0 ap385269
  • 23.0 ap385272
  • 23.0 ap385275
  • 23.0 ap385276
  • 23.0 ap385277
  • 23.0 ap385280
  • 23.0 ap385282
  • 23.0 ap385265
  • 23.0 ap385286
  • 23.0 ap385287
  • RI.2022.08
  • RI.2022.09
  • RI.2022.10
  • RI.2022.12
  • RI.2023.01
  • RI.2023.03
  • RI.2023.02
  • RI.2023.04
Problem Types
TypeCWE IDDescription
cweCWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: cwe
CWE ID: CWE-79
Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF
x_transferred
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ykramarz@cisco.com
Published At:03 Aug, 2023 | 22:15
Updated At:25 Jan, 2024 | 17:15

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot Application Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Secondary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>broadworks_application_delivery_platform>>Versions before ri.2023.06(exclusive)
cpe:2.3:a:cisco:broadworks_application_delivery_platform:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>broadworks_application_server>>Versions before 23.0.2023.08(exclusive)
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:-:*:*:*
Cisco Systems, Inc.
cisco
>>broadworks_application_server>>Versions before 2023.06(exclusive)
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:release_independent:*:*:*
Cisco Systems, Inc.
cisco
>>broadworks_application_server>>Versions from 24.0(inclusive) to 24.0.2023.08(exclusive)
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:-:*:*:*
Cisco Systems, Inc.
cisco
>>broadworks_xtended_services_platform>>Versions before 23.0.2023.08(exclusive)
cpe:2.3:a:cisco:broadworks_xtended_services_platform:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE-79Secondaryykramarz@cisco.com
CWE ID: CWE-79
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-79
Type: Secondary
Source: ykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezFykramarz@cisco.com
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-commpilot-xss-jC46sezF
Source: ykramarz@cisco.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

9498Records found

CVE-2023-20142
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.11% / 29.96%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-25 Oct, 2024 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv325rv320rv042rv016_firmwarerv042grv082rv320_firmwarerv042_firmwarerv325_firmwarerv082_firmwarerv016rv042g_firmwareCisco Small Business RV Series Router Firmware
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20053
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.10% / 27.46%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 15:27
Updated-21 Nov, 2024 | 21:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_dashboardCisco Nexus Dashboard
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1449
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 52.49%
||
7 Day CHG~0.00%
Published-15 Jul, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Cisco WebEx Meetings Server 2.6 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuy92711.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-webex_meetings_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20151
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.11% / 29.96%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-25 Oct, 2024 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv325rv320rv042rv016_firmwarerv042grv082rv320_firmwarerv042_firmwarerv325_firmwarerv082_firmwarerv016rv042g_firmwareCisco Small Business RV Series Router Firmware
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20068
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.10% / 27.46%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-25 Oct, 2024 | 16:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Prime Infrastructure Reflected Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Prime Infrastructure Software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of the web-based management interface on an affected device to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureCisco Prime Infrastructure
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20208
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.05% / 13.79%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 18:48
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct an XSS attack against a user of the web-based management interface of an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-87
Improper Neutralization of Alternate XSS Syntax
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20188
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.06% / 18.58%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device. Cisco has not released software updates to address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sf500-48psf200-24psg500-52p_firmwaresg500x-24mpp_firmwaresf500-48p_firmwaresg300-10p_firmwaresf500-24mp_firmwaresg300-52_firmwaresg300-28mpsf302-08mp_firmwaresg500-52mp_firmwaresf302-08sg300-28pp_firmwaresf200-24sg300-52sg500x-48psg200-26sg500-28sg500x-48sf302-08mpp_firmwaresg200-50p_firmwaresg200-26_firmwaresg500x-48mppsg500x-48p_firmwaresg200-18_firmwaresg200-08psf200-24_firmwaresg300-20sg500-28psf500-48mpsg300-10psg300-52p_firmwaresf300-48ppsg500x-24_firmwaresf200-48sf302-08_firmwaresg300-10mp_firmwaresg500x-24psg200-08p_firmwaresf200-24fp_firmwaresg300-10mpsf300-24_firmwaresf300-48psf300-08sg500-52sg300-10ppsf300-24mp_firmwaresg500-28mpp_firmwaresg200-08sg500-52psg500-52_firmwaresg500x-48mpp_firmwaresg200-10fpsf300-24ppsg200-26fpsg200-26p_firmwaresg300-28sg200-10fp_firmwaresg300-10mpp_firmwaresg500-28p_firmwaresg300-10_firmwaresg500x-24sf300-24p_firmwaresg200-50sg300-52mpsg200-50fp_firmwaresg500x-24p_firmwaresg300-10pp_firmwaresf200-48p_firmwaresf302-08p_firmwaresg200-26fp_firmwaresg200-50psf500-24sg500-52mpsg300-10sf300-48p_firmwaresf200-24fpsg300-52psg300-10mppsg300-28psf300-24sf300-24psf200-48psg200-26psg300-20_firmwaresg200-08_firmwaresf500-24p_firmwaresf302-08mppsg300-28sfpsf302-08mpsg500x-24mppsf300-48pp_firmwaresf500-48sf300-24mpsg300-10sfpsg300-28mp_firmwaresf500-24mpsg200-50fpsf302-08psg300-28_firmwaresf500-24psg500-28mppsf302-08pp_firmwaresf200-24p_firmwaresf302-08ppsf300-48sg300-52mp_firmwaresg200-18sg200-50_firmwaresg500x-48_firmwaresf300-08_firmwaresf200-48_firmwaresg300-10sfp_firmwaresg300-28sfp_firmwaresg500-28_firmwaresf500-24_firmwaresf500-48mp_firmwaresg300-28ppsf300-48_firmwaresf500-48_firmwaresf300-24pp_firmwaresg300-28p_firmwareCisco Small Business Smart and Managed Switches
CWE ID-CWE-87
Improper Neutralization of Alternate XSS Syntax
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20019
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.18% / 40.19%
||
7 Day CHG~0.00%
Published-19 Jan, 2023 | 01:38
Updated-02 Aug, 2024 | 08:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform, Cisco BroadWorks Application Server, and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-broadworks_application_delivery_platformbroadworks_application_serverbroadworks_xtended_services_platformCisco BroadWorks
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20218
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.10% / 28.70%
||
7 Day CHG~0.00%
Published-03 Aug, 2023 | 21:20
Updated-17 Oct, 2024 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. Cisco will not release software updates that address this vulnerability. {{value}} ["%7b%7bvalue%7d%7d"])}]]

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-spa501g_firmwarespa525g_firmwarespa512gspa525gspa512g_firmwarespa525spa508gspa525_firmwarespa502g_firmwarespa501gspa514g_firmwarespa502gspa509gspa500sspa500dsspa504g_firmwarespa525g2spa509g_firmwarespa508g_firmwarespa500s_firmwarespa514gspa525g2_firmwarespa500ds_firmwarespa504gCisco Small Business IP Phones
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20041
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.11% / 29.55%
||
7 Day CHG~0.00%
Published-01 Nov, 2023 | 16:52
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-20074
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.06% / 18.71%
||
7 Day CHG~0.00%
Published-01 Nov, 2023 | 16:53
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2008-6280
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-6.04% / 90.37%
||
7 Day CHG~0.00%
Published-25 Feb, 2009 | 23:00
Updated-07 Aug, 2024 | 11:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in apply.cgi on the Linksys WRT160N allows remote attackers to inject arbitrary web script or HTML via the action parameter in a DHCP_Static operation.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-wrt160nn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20488
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 32.61%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 18:35
Updated-06 Sep, 2024 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Communications Manager Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_managerCisco Unified Communications Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20405
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.61% / 68.81%
||
7 Day CHG~0.00%
Published-05 Jun, 2024 | 16:15
Updated-01 Aug, 2024 | 21:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a stored XSS attack by exploiting an RFI vulnerability. This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive information on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-finesseCisco Unified Contact Center EnterpriseCisco Packaged Contact Center EnterpriseCisco Unified Contact Center ExpressCisco Finesse
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20386
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.06% / 18.44%
||
7 Day CHG~0.00%
Published-23 Oct, 2024 | 17:33
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerfirepower_management_centerCisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20534
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.06% / 18.64%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:31
Updated-06 Nov, 2024 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IP Phone 6800, 7800, 8800, and 9800 Series with Multiplatform Firmware Stored Cross-Site Scripting Vulnerability

A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 6800, 7800, and 8800 Series, and Cisco Video Phone 8875 with Cisco Multiplatform Firmware could allow an authenticated, remote attacker to conduct stored cross-site scripting (XSS) attacks against users. This vulnerability exists because the web UI of an affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Note: To exploit this vulnerability, Web Access must be enabled on the phone and the attacker must have Admin credentials on the device. Web Access is disabled by default.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco IP Phones with Multiplatform FirmwareCisco Session Initiation Protocol (SIP) Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20533
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.06% / 18.64%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:31
Updated-06 Nov, 2024 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IP Phone 6800, 7800, 8800, and 9800 Series with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities

A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 6800, 7800, and 8800 Series, and Cisco Video Phone 8875 with Cisco Multiplatform Firmware could allow an authenticated, remote attacker to conduct stored cross-site scripting (XSS) attacks against users. This vulnerability exists because the web UI of an affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Note: To exploit this vulnerability, Web Access must be enabled on the phone and the attacker must have Admin credentials on the device. Web Access is disabled by default.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco IP Phones with Multiplatform FirmwareCisco Session Initiation Protocol (SIP) Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20539
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.07% / 20.99%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:32
Updated-22 Nov, 2024 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct a stored XSS attack against a user of the interface. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20341
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.08% / 24.28%
||
7 Day CHG~0.00%
Published-23 Oct, 2024 | 17:09
Updated-01 Nov, 2024 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance WebVPN Cross-Site Scripting Vulnerability

A vulnerability in the VPN web client services feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a browser that is accessing an affected device. This vulnerability is due to improper validation of user-supplied input to application endpoints. An attacker could exploit this vulnerability by persuading a user to follow a link designed to submit malicious input to the affected application. A successful exploit could allow the attacker to execute arbitrary HTML or script code in the browser in the context of the web services page.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defense_softwareadaptive_security_appliance_softwareCisco Firepower Threat Defense SoftwareCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20415
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.06% / 18.44%
||
7 Day CHG~0.00%
Published-23 Oct, 2024 | 17:46
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerfirepower_management_centerCisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20538
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.09% / 26.00%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:31
Updated-20 Nov, 2024 | 14:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco ISE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface on an affected system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20460
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.05% / 13.96%
||
7 Day CHG~0.00%
Published-16 Oct, 2024 | 16:16
Updated-31 Oct, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ata_192_firmwareata_191_firmwareata_192ata_191Cisco Analog Telephone Adaptor (ATA) Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CVE-2022-20663
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 8.91%
||
7 Day CHG~0.00%
Published-15 Nov, 2024 | 15:38
Updated-31 Jul, 2025 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Secure Network Analytics Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_network_analyticsCisco Secure Network Analytics
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-20832
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.05% / 14.02%
||
7 Day CHG~0.00%
Published-10 Nov, 2022 | 17:38
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2009-1201
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-12.89% / 93.79%
||
7 Day CHG~0.00%
Published-25 Jun, 2009 | 17:00
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Eval injection vulnerability in the csco_wrap_js function in /+CSCOL+/cte.js in WebVPN on the Cisco Adaptive Security Appliances (ASA) device with software 8.0(4), 8.1.2, and 8.2.1 allows remote attackers to bypass a DOM wrapper and conduct cross-site scripting (XSS) attacks by setting CSCO_WebVPN['process'] to the name of a crafted function, aka Bug ID CSCsy80694.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliancen/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2009-1287
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.93% / 75.17%
||
7 Day CHG~0.00%
Published-13 Apr, 2009 | 16:00
Updated-07 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Cisco Subscriber Edge Services Manager (SESM) allows remote attackers to inject arbitrary web script or HTML via the URI. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-subscriber_edge_services_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2008-0533
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-4.34% / 88.49%
||
7 Day CHG~0.00%
Published-14 Mar, 2008 | 20:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to inject arbitrary web script or HTML via an argument located immediately after the Help argument, and possibly unspecified other vectors.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-acs_for_windowsacs_solution_engineuser_changeable_passwordn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-20872
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.05% / 14.02%
||
7 Day CHG~0.00%
Published-10 Nov, 2022 | 17:41
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20383
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.10% / 28.12%
||
7 Day CHG~0.00%
Published-15 May, 2024 | 17:59
Updated-08 Aug, 2025 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Secure Email and Web Manager Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_and_web_manager_m195secure_email_and_web_manager_m380secure_email_and_web_manager_m390secure_email_and_web_manager_m390xsecure_email_and_web_manager_m680secure_email_and_web_manager_m170secure_email_and_web_manager_m395secure_email_and_web_manager_virtual_appliance_m300vsecure_email_and_web_manager_m690secure_email_and_web_manager_m695secure_email_and_web_manager_virtual_appliance_m100vsecure_email_and_web_manager_virtual_appliance_m600vsecure_email_and_web_manager_m190secure_email_and_web_manager_m690xasyncosCisco Secure Email and Web Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20525
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.09% / 26.00%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:30
Updated-20 Nov, 2024 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Reflected Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco ISE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-20641
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.14% / 34.95%
||
7 Day CHG~0.00%
Published-14 Jan, 2022 | 05:00
Updated-06 Nov, 2024 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Security Manager Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-security_managerCisco Security Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20511
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.09% / 26.00%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:29
Updated-07 Aug, 2025 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Communications Manager Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_managerCisco Unified Communications Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20530
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.09% / 26.00%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:30
Updated-20 Nov, 2024 | 16:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Reflected Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco ISE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2007-4633
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.52% / 65.68%
||
7 Day CHG~0.00%
Published-31 Aug, 2007 | 23:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to inject arbitrary web script or HTML via the lang variable to the (1) user or (2) admin logon page, aka CSCsi10728.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-call_managerunified_communications_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20479
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.10% / 27.55%
||
7 Day CHG~0.00%
Published-07 Aug, 2024 | 16:43
Updated-23 Aug, 2024 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have Admin privileges on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20256
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.09% / 26.80%
||
7 Day CHG~0.00%
Published-15 May, 2024 | 17:56
Updated-07 Aug, 2025 | 17:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_web_appliance_virtual_s1000vsecure_web_appliance_virtual_s600vsecure_email_and_web_manager_m690secure_email_and_web_manager_m390secure_email_and_web_manager_m195secure_email_and_web_manager_m395secure_web_appliance_s196secure_email_and_web_manager_virtual_appliance_m100vsecure_email_and_web_manager_m390xsecure_email_and_web_manager_m695secure_web_appliance_virtual_s100vsecure_email_and_web_manager_m690xsecure_web_appliance_virtual_s300vsecure_email_and_web_manager_m170secure_email_and_web_manager_virtual_appliance_m300vsecure_email_and_web_manager_virtual_appliance_m600vsecure_web_appliance_s396secure_email_and_web_manager_m190asyncossecure_email_and_web_manager_m680secure_email_and_web_manager_m380secure_web_appliance_s696Cisco Secure Web ApplianceCisco Secure Email and Web Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20305
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.08% / 23.82%
||
7 Day CHG~0.00%
Published-26 Jan, 2024 | 17:26
Updated-03 Jun, 2025 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unity_connectionCisco Unity Connection
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2008-3821
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-10.64% / 93.01%
||
7 Day CHG~0.00%
Published-16 Jan, 2009 | 21:00
Updated-07 Aug, 2024 | 09:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the HTTP server in Cisco IOS 11.0 through 12.4 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to the ping program or (2) unspecified other aspects of the URI.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20257
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.09% / 26.80%
||
7 Day CHG~0.00%
Published-15 May, 2024 | 17:58
Updated-06 Aug, 2025 | 16:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_gateway_c395secure_email_gateway_virtual_appliance_c300vsecure_email_gateway_virtual_appliance_c600vsecure_email_gateway_c195secure_email_gateway_virtual_appliance_c100vasyncossecure_email_gateway_c695Cisco Secure Email
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20258
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 33.23%
||
7 Day CHG-0.04%
Published-15 May, 2024 | 17:32
Updated-31 Jul, 2025 | 19:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_gateway_c690xsecure_email_and_web_manager_m690xsecure_email_gateway_c390secure_email_and_web_manager_m195secure_email_gateway_virtual_appliance_c300vsecure_email_gateway_c690secure_email_and_web_manager_virtual_appliance_m600vsecure_email_gateway_c195secure_email_and_web_manager_m680secure_email_gateway_virtual_appliance_c600vsecure_email_and_web_manager_m690asyncossecure_email_and_web_manager_virtual_appliance_m100vsecure_email_and_web_manager_m695secure_email_and_web_manager_m380secure_email_and_web_manager_m190secure_email_gateway_virtual_appliance_c100vsecure_email_and_web_manager_m390secure_email_and_web_manager_virtual_appliance_m300vsecure_email_and_web_manager_m395secure_email_and_web_manager_m390xsecure_email_and_web_manager_m170secure_email_gateway_c190secure_email_gateway_c395secure_email_gateway_c695Cisco Secure Email and Web ManagerCisco Secure Emailsecure_emailsecure_email_and_web_manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20372
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 20.13%
||
7 Day CHG~0.00%
Published-23 Oct, 2024 | 17:29
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerfirepower_management_centerCisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20409
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.06% / 19.14%
||
7 Day CHG~0.00%
Published-23 Oct, 2024 | 17:38
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerfirepower_management_centerCisco Firepower Management Center
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-20512
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 32.61%
||
7 Day CHG~0.00%
Published-16 Oct, 2024 | 16:17
Updated-04 Aug, 2025 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_contact_center_management_portalCisco Unified Contact Center Management Portal
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1311
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 48.23%
||
7 Day CHG~0.00%
Published-06 Feb, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the management interface in Cisco Jabber Guest Server 10.6(8) allows remote attackers to inject arbitrary web script or HTML via the host tag parameter, aka Bug ID CSCuy08224.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-jabber_guestn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1471
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.47% / 63.67%
||
7 Day CHG~0.00%
Published-02 Sep, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the web-based management interface on Cisco Small Business 220 devices with firmware before 1.0.1.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuz76232.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-small_business_220_series_smart_plus_switchesn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2008-4542
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-3.5||LOW
EPSS-0.34% / 55.67%
||
7 Day CHG~0.00%
Published-13 Oct, 2008 | 18:00
Updated-07 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Cisco Unity 4.x before 4.2(1)ES162, 5.x before 5.0(1)ES56, and 7.x before 7.0(2)ES8 allows remote authenticated administrators to inject arbitrary web script or HTML by entering it in the database (aka data store).

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unityn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1355
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 48.23%
||
7 Day CHG~0.00%
Published-03 Mar, 2016 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the Device Management UI in the management interface in Cisco FireSIGHT System Software 6.1.0 allows remote attackers to inject arbitrary web script or HTML via a crafted value, aka Bug ID CSCuy41687.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firesight_system_softwaren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1447
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.45% / 62.88%
||
7 Day CHG~0.00%
Published-15 Jul, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the administrator interface in Cisco WebEx Meetings Server 2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCuy83194.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-webex_meetings_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1318
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 48.23%
||
7 Day CHG~0.00%
Published-09 Feb, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.1 allows remote attackers to inject arbitrary web script or HTML via crafted markup data, aka Bug ID CSCux15489.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-application_policy_infrastructure_controller_enterprise_modulen/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-1476
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.19% / 40.94%
||
7 Day CHG~0.00%
Published-22 Aug, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability on Cisco IP Phone 8800 devices with software 11.0 allows remote authenticated users to inject arbitrary web script or HTML via crafted parameters, aka Bug ID CSCuz03024.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ip_phone_8800_series_firmwareip_phone_8800n/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 189
  • 190
  • Next
Details not found