Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-20165

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-22 Jan, 2025 | 16:21
Updated At-18 Feb, 2025 | 19:39
Rejected At-
Credits

Cisco BroadWorks SIP Denial of Service Vulnerability

A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition. This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:22 Jan, 2025 | 16:21
Updated At:18 Feb, 2025 | 19:39
Rejected At:
▼CVE Numbering Authority (CNA)
Cisco BroadWorks SIP Denial of Service Vulnerability

A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition. This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco BroadWorks
Default Status
unknown
Versions
Affected
  • 22.0
  • 23.0
  • RI.2021.02
  • 23.0 ap380391
  • 23.0 ap380396
  • RI.2021.08
  • RI.2021.09
  • RI.2021.10
  • RI.2021.11
  • RI.2021.12
  • 23.0 ap382281
  • 22.0 ap382358
  • 23.0 ap382358
  • RI.2022.02
  • RI.2022.03
  • 23.0 ap373151
  • 23.0 ap371527
  • 22.0 ap353530
  • 22.0 ap348633
  • 22.0 ap347741
  • 22.0 ap352375
  • 22.0 ap353911
  • 22.0 ap339206
  • 22.0 ap351637
  • 22.0 ap351160
  • 22.0 ap339395
  • 23.0 ap372548
  • 23.0 ap373098
  • 22.0 ap358889
  • 22.0 ap359119
  • 22.0 ap357087
  • 22.0 ap357506
  • 22.0 ap361590
  • 22.0 ap356317
  • 22.0 ap358076
  • 22.0 ap355095
  • 22.0 ap352969
  • 22.0 ap356705
  • 23.0 ap375383
  • 23.0 ap375465
  • 23.0 ap375435
  • 22.0 ap375601
  • 22.0 ap375345
  • 22.0 ap349872
  • 22.0 ap381419
  • 23.0 ap380771
  • 22.0 ap367805
  • 22.0 ap365223
  • 22.0 ap368419
  • 22.0 ap360116
  • 22.0 ap366298
  • 22.0 ap368125
  • 22.0 ap364925
  • 22.0 ap368497
  • 22.0 ap364168
  • 22.0 ap367732
  • 23.0 ap380041
  • 22.0 ap382183
  • 22.0 ap382057
  • 23.0 ap381271
  • 23.0 ap381243
  • 23.0 ap380691
  • 23.0 ap375345
  • 23.0 ap375601
  • 22.0 ap377577
  • 23.0 ap379795
  • 23.0 ap382195
  • 23.0 ap376661
  • RI.2022.06
  • RI.2022.05
  • RI.2022.04
  • 23.0 ap376010
  • 23.0 ap382487
  • 23.0 ap383569
  • 23.0 ap383519
  • 23.0 ap383560
  • 22.0 ap383754
  • 23.0 ap383710
  • RI.2022.08
  • 22.0 ap366290
  • 22.0 ap372504
  • 22.0 ap366807
  • 22.0 ap373151
  • 22.0 ap366181
  • 22.0 ap366207
  • 22.0 ap371527
  • 23.0 ap367434
  • 22.0 ap365170
  • 22.0 ap372620
  • 22.0 ap354474
  • 22.0 ap372243
  • 22.0 ap366268
  • 22.0 ap366373
  • 22.0 ap379780
  • 23.0 ap351263
  • 22.0 ap364384
  • 22.0 ap365775
  • 22.0 ap361308
  • 22.0 ap351263
  • 22.0 ap364369
  • 22.0 ap364879
  • 22.0 ap365341
  • 22.0 ap360568
  • 22.0 ap366916
  • 22.0 ap363363
  • 22.0 ap363366
  • 22.0 ap374507
  • 22.0 ap374557
  • 22.0 ap375533
  • 22.0 ap373283
  • 22.0 ap372845
  • 22.0 ap373684
  • 22.0 ap373817
  • 22.0 ap367794
  • 22.0 ap369778
  • 22.0 ap368180
  • 22.0 ap369774
  • 22.0 ap366898
  • 22.0 ap366882
  • 22.0 ap359646
  • 22.0 ap353184
  • 22.0 ap358871
  • 22.0 ap348431
  • 22.0 ap358861
  • 22.0 ap348100
  • 22.0 ap359283
  • 22.0 ap356817
  • 22.0 ap356375
  • 22.0 ap373015
  • 22.0 ap374946
  • 22.0 ap374269
  • 22.0 ap373434
  • 22.0 ap373003
  • 22.0 ap372234
  • 22.0 ap365239
  • 22.0 ap369286
  • 22.0 ap367782
  • 22.0 ap359991
  • 22.0 ap359729
  • 22.0 ap358357
  • 22.0 ap360306
  • 22.0 ap359433
  • 22.0 ap359972
  • 22.0 ap365889
  • 22.0 ap369931
  • 22.0 ap353426
  • 22.0 ap360244
  • 22.0 ap360966
  • 22.0 ap367874
  • 22.0 ap376710
  • 22.0 ap377079
  • 22.0 ap356186
  • 23.0 ap377147
  • 22.0 ap380691
  • 22.0 ap361695
  • 23.0 ap383943
  • 23.0 ap383955
  • RI.2022.09
  • 23.0 ap383838
  • 23.0 ap384023
  • 23.0 ap384025
  • 23.0 ap383797
  • 22.0 ap383797
  • 23.0 ap384127
  • 23.0 ap384015
  • RI.2022.10
  • 22.0 ap384211
  • 23.0 ap384211
  • 23.0 ap383717
  • 23.0 ap384185
  • 23.0 ap384173
  • 23.0 ap383815
  • 23.0 ap384245
  • 22.0 ap383514
  • 22.0 ap360201
  • 22.0 ap353676
  • 23.0 ap377120
  • 22.0 ap374339
  • 22.0 ap355070
  • 22.0 ap374330
  • 22.0 ap375089
  • 23.0 ap368445
  • 23.0 ap372994
  • 23.0 ap369219
  • 23.0 ap369693
  • 22.0 ap369219
  • 23.0 ap381725
  • 22.0 ap370636
  • 23.0 ap376521
  • 22.0 ap371262
  • 22.0 ap382434
  • 22.0 ap355027
  • 23.0 ap379049
  • 22.0 ap361054
  • 22.0 ap369738
  • 23.0 ap375634
  • 22.0 ap369433
  • 22.0 ap377680
  • 22.0 ap357047
  • 22.0 ap377727
  • 22.0 ap377147
  • 22.0 ap377908
  • 23.0 ap367874
  • 22.0 ap366375
  • 22.0 ap379847
  • 22.0 ap358059
  • 23.0 ap373924
  • 23.0 ap383597
  • 22.0 ap365727
  • 22.0 ap374530
  • 22.0 ap360912
  • 23.0 ap373018
  • 22.0 ap378509
  • 23.0 ap376485
  • 22.0 ap371043
  • 22.0 ap378603
  • 22.0 ap372657
  • 22.0 ap363846
  • 22.0 ap376041
  • 22.0 ap372488
  • 22.0 ap359145
  • 23.0 ap368461
  • 22.0 ap378966
  • 23.0 ap376602
  • 22.0 ap356603
  • 23.0 ap373257
  • 23.0 ap376668
  • 22.0 ap381810
  • 23.0 ap375533
  • 22.0 ap364278
  • 23.0 ap380817
  • 23.0 ap374295
  • 22.0 ap381725
  • 23.0 ap380537
  • 22.0 ap377398
  • 22.0 ap370817
  • 22.0 ap374818
  • 23.0 ap380042
  • 23.0 ap374475
  • 22.0 ap373644
  • 22.0 ap366330
  • 22.0 ap361696
  • 23.0 ap377755
  • 22.0 ap373813
  • 22.0 ap375343
  • 22.0 ap379374
  • 23.0 ap374031
  • 22.0 ap377900
  • 22.0 ap360931
  • 22.0 ap362831
  • 22.0 ap367461
  • 22.0 ap354764
  • 22.0 ap352325
  • 23.0 ap372091
  • 23.0 ap370911
  • 22.0 ap363770
  • 22.0 ap379487
  • 23.0 ap380180
  • 23.0 ap367969
  • 23.0 ap380697
  • 22.0 ap363372
  • 22.0 ap353490
  • 23.0 ap373271
  • 22.0 ap356848
  • 22.0 ap373918
  • 22.0 ap382158
  • 22.0 ap364598
  • 23.0 ap381584
  • 23.0 ap379888
  • 22.0 ap356512
  • 22.0 ap379098
  • 22.0 ap376620
  • 23.0 ap367998
  • 23.0 ap366348
  • 22.0 ap376614
  • 23.0 ap382824
  • 23.0 ap376984
  • 23.0 ap366677
  • 23.0 ap381523
  • 22.0 ap383569
  • 22.0 ap382524
  • 22.0 ap379016
  • 22.0 ap363584
  • 22.0 ap358399
  • 22.0 ap383335
  • 23.0 ap374145
  • 22.0 ap374295
  • 23.0 ap376509
  • 22.0 ap354785
  • 23.0 ap381091
  • 23.0 ap380512
  • 22.0 ap355286
  • 22.0 ap368887
  • 22.0 ap383560
  • 23.0 ap382977
  • 23.0 ap368180
  • 22.0 ap352516
  • 22.0 ap350176
  • 23.0 ap366373
  • 23.0 ap375038
  • 23.0 ap373102
  • 23.0 ap378965
  • 23.0 ap378080
  • 22.0 ap377566
  • 22.0 ap359589
  • 23.0 ap380167
  • 22.0 ap372338
  • 22.0 ap361445
  • 22.0 ap354784
  • 22.0 ap356706
  • 22.0 ap378140
  • 23.0 ap378585
  • 22.0 ap356458
  • 22.0 ap368216
  • 22.0 ap367675
  • 22.0 ap368978
  • 23.0 ap374330
  • 22.0 ap355775
  • 23.0 ap372338
  • 22.0 ap380629
  • 23.0 ap376087
  • 22.0 ap367207
  • 22.0 ap366346
  • 22.0 ap376356
  • 22.0 ap375383
  • 22.0 ap373336
  • 23.0 ap378863
  • 22.0 ap352178
  • 23.0 ap363366
  • 22.0 ap351973
  • 22.0 ap366261
  • 22.0 ap354027
  • 23.0 ap368706
  • 22.0 ap364781
  • 23.0 ap362771
  • 23.0 ap360317
  • 22.0 ap380282
  • 22.0 ap356434
  • 23.0 ap380239
  • 22.0 ap365730
  • 23.0 ap381270
  • 22.0 ap355825
  • 22.0 ap361974
  • 22.0 ap371155
  • 22.0 ap377757
  • 22.0 ap361598
  • 22.0 ap383168
  • 23.0 ap377908
  • 22.0 ap370103
  • 22.0 ap381091
  • 23.0 ap382945
  • 23.0 ap377779
  • 22.0 ap346307
  • 23.0 ap365239
  • 22.0 ap371313
  • 23.0 ap371771
  • 23.0 ap373452
  • 23.0 ap375865
  • 22.0 ap374714
  • 22.0 ap376179
  • 22.0 ap362001
  • 22.0 ap378426
  • 23.0 ap369748
  • 23.0 ap383002
  • 22.0 ap371030
  • 22.0 ap370459
  • 23.0 ap372708
  • 22.0 ap382488
  • 22.0 ap368326
  • 23.0 ap370465
  • 22.0 ap355000
  • 22.0 ap355922
  • 23.0 ap369454
  • 22.0 ap364922
  • 22.0 ap365167
  • 22.0 ap374475
  • 23.0 ap367675
  • 22.0 ap379874
  • 22.0 ap366677
  • 22.0 ap366972
  • 22.0 ap372100
  • 23.0 ap373434
  • 22.0 ap356164
  • 23.0 ap372757
  • 22.0 ap376531
  • 23.0 ap377412
  • 22.0 ap365232
  • 22.0 ap348945
  • 22.0 ap352703
  • 22.0 ap364670
  • 23.0 ap370103
  • 23.0 ap370884
  • 23.0 ap366261
  • 22.0 ap367969
  • 23.0 ap378865
  • 22.0 ap371436
  • 22.0 ap375685
  • 23.0 ap380161
  • 22.0 ap366490
  • 23.0 ap380737
  • 23.0 ap370952
  • 22.0 ap374895
  • 22.0 ap366656
  • 22.0 ap379548
  • 23.0 ap378471
  • 23.0 ap379780
  • 22.0 ap378865
  • 22.0 ap354964
  • 22.0 ap371656
  • 22.0 ap381594
  • 23.0 ap381118
  • 22.0 ap368087
  • 22.0 ap363234
  • 22.0 ap362713
  • 23.0 ap372163
  • 23.0 ap379833
  • 22.0 ap377494
  • 23.0 ap367986
  • 22.0 ap362610
  • 22.0 ap378882
  • 23.0 ap370544
  • 22.0 ap379008
  • 22.0 ap382945
  • 22.0 ap362088
  • 22.0 ap383002
  • 23.0 ap370627
  • 22.0 ap362150
  • 22.0 ap371295
  • 22.0 ap350179
  • 22.0 ap371467
  • 23.0 ap369150
  • 22.0 ap365449
  • 23.0 ap375264
  • 23.0 ap379694
  • 22.0 ap381609
  • 22.0 ap353915
  • 22.0 ap358234
  • 22.0 ap363146
  • 22.0 ap369934
  • 23.0 ap366184
  • 22.0 ap371516
  • 22.0 ap365800
  • 22.0 ap356960
  • 22.0 ap343927
  • 22.0 ap361999
  • 22.0 ap373954
  • 23.0 ap379852
  • 22.0 ap375655
  • 23.0 ap382857
  • 22.0 ap380396
  • 22.0 ap381569
  • 22.0 ap369693
  • 22.0 ap358971
  • 23.0 ap366290
  • 22.0 ap378258
  • 22.0 ap380818
  • 22.0 ap359227
  • 22.0 ap358578
  • 23.0 ap371050
  • 23.0 ap383247
  • 22.0 ap354413
  • 22.0 ap382053
  • 23.0 ap367513
  • 22.0 ap374803
  • 23.0 ap383536
  • 22.0 ap360600
  • 22.0 ap373046
  • 23.0 ap372641
  • 22.0 ap379396
  • 22.0 ap377307
  • 23.0 ap379438
  • 23.0 ap379397
  • 22.0 ap365372
  • 22.0 ap364158
  • 23.0 ap380751
  • 22.0 ap361533
  • 22.0 ap371049
  • 22.0 ap352372
  • 23.0 ap378258
  • 23.0 ap383064
  • 22.0 ap362619
  • 23.0 ap379772
  • 22.0 ap379934
  • 23.0 ap365801
  • 23.0 ap366701
  • 22.0 ap381125
  • 22.0 ap357471
  • 22.0 ap362298
  • 22.0 ap353839
  • 22.0 ap383309
  • 23.0 ap375133
  • 22.0 ap353168
  • 23.0 ap369132
  • 23.0 ap371583
  • 22.0 ap373564
  • 23.0 ap366375
  • 22.0 ap363815
  • 23.0 ap365170
  • 22.0 ap365400
  • 22.0 ap371613
  • 22.0 ap373950
  • 23.0 ap352969
  • 23.0 ap379046
  • 22.0 ap380737
  • 22.0 ap359029
  • 23.0 ap367325
  • 22.0 ap359765
  • 23.0 ap378953
  • 22.0 ap357632
  • 22.0 ap361883
  • 23.0 ap379191
  • 22.0 ap364628
  • 22.0 ap369667
  • 22.0 ap352962
  • 22.0 ap349384
  • 22.0 ap367325
  • 22.0 ap368604
  • 22.0 ap370186
  • 23.0 ap371030
  • 23.0 ap376041
  • 23.0 ap380841
  • 22.0 ap372075
  • 22.0 ap370138
  • 22.0 ap371587
  • 23.0 ap366298
  • 22.0 ap380239
  • 23.0 ap377566
  • 22.0 ap380739
  • 23.0 ap371961
  • 22.0 ap367524
  • 22.0 ap376416
  • 22.0 ap378599
  • 22.0 ap381732
  • 22.0 ap354750
  • 22.0 ap375060
  • 23.0 ap383168
  • 22.0 ap351855
  • 22.0 ap382487
  • 22.0 ap370801
  • 23.0 ap379548
  • 22.0 ap361534
  • 22.0 ap352330
  • 22.0 ap369132
  • 22.0 ap375354
  • 22.0 ap363144
  • 22.0 ap361580
  • 23.0 ap381348
  • 22.0 ap383710
  • 22.0 ap378924
  • 23.0 ap363729
  • 22.0 ap363430
  • 22.0 ap375308
  • 23.0 ap376704
  • 23.0 ap374971
  • 22.0 ap368510
  • 23.0 ap364699
  • 23.0 ap374557
  • 23.0 ap372351
  • 22.0 ap364651
  • 22.0 ap373777
  • 22.0 ap370680
  • 22.0 ap380143
  • 23.0 ap367396
  • 22.0 ap364797
  • 23.0 ap372100
  • 23.0 ap367453
  • 22.0 ap373664
  • 22.0 ap373122
  • 22.0 ap370911
  • 22.0 ap354090
  • 23.0 ap382039
  • 22.0 ap372643
  • 23.0 ap381072
  • 22.0 ap358019
  • 23.0 ap381410
  • 22.0 ap378863
  • 22.0 ap364898
  • 22.0 ap353509
  • 23.0 ap378153
  • 23.0 ap383754
  • 23.0 ap382158
  • 22.0 ap374414
  • 23.0 ap380936
  • 22.0 ap377068
  • 22.0 ap366013
  • 22.0 ap357791
  • 22.0 ap380167
  • 22.0 ap379465
  • 22.0 ap382386
  • 22.0 ap369607
  • 23.0 ap372845
  • 22.0 ap373914
  • 23.0 ap380783
  • 22.0 ap378999
  • 23.0 ap382386
  • 23.0 ap369501
  • 22.0 ap364199
  • 22.0 ap370269
  • 23.0 ap377496
  • 23.0 ap368218
  • 22.0 ap380180
  • 22.0 ap372708
  • 23.0 ap379934
  • 23.0 ap376426
  • 22.0 ap360325
  • 22.0 ap363392
  • 23.0 ap377523
  • 22.0 ap380128
  • 22.0 ap355343
  • 22.0 ap381781
  • 22.0 ap368695
  • 23.0 ap378436
  • 22.0 ap365632
  • 23.0 ap382057
  • 22.0 ap379524
  • 23.0 ap372706
  • 22.0 ap357775
  • 23.0 ap364559
  • 22.0 ap371583
  • 23.0 ap376541
  • 22.0 ap366184
  • 22.0 ap363729
  • 23.0 ap356141
  • 22.0 ap358893
  • 22.0 ap356538
  • 22.0 ap356503
  • 22.0 ap360904
  • 22.0 ap374460
  • 22.0 ap371437
  • 23.0 ap370620
  • 22.0 ap371050
  • 22.0 ap366117
  • 23.0 ap366117
  • 22.0 ap375865
  • 23.0 ap367340
  • 23.0 ap378880
  • 22.0 ap376523
  • 22.0 ap380787
  • 22.0 ap375509
  • 22.0 ap350217
  • 22.0 ap380854
  • 23.0 ap376252
  • 22.0 ap354180
  • 22.0 ap342836
  • 23.0 ap370361
  • 22.0 ap363759
  • 23.0 ap374506
  • 23.0 ap377384
  • 23.0 ap365775
  • 23.0 ap373914
  • 23.0 ap382192
  • 23.0 ap383573
  • 23.0 ap380045
  • 22.0 ap366301
  • 22.0 ap370615
  • 22.0 ap355285
  • 22.0 ap380626
  • 23.0 ap380282
  • 22.0 ap359911
  • 22.0 ap377149
  • 23.0 ap356256
  • 22.0 ap358563
  • 22.0 ap370177
  • 23.0 ap363128
  • 23.0 ap371295
  • 22.0 ap355555
  • 23.0 ap381961
  • 22.0 ap370948
  • 22.0 ap359470
  • 23.0 ap373820
  • 23.0 ap368419
  • 22.0 ap371495
  • 23.0 ap380854
  • 23.0 ap378862
  • 22.0 ap356390
  • 22.0 ap363596
  • 22.0 ap378970
  • 23.0 ap378391
  • 23.0 ap375343
  • 23.0 ap369302
  • 23.0 ap368632
  • 22.0 ap366295
  • 23.0 ap379847
  • 23.0 ap374649
  • 22.0 ap353903
  • 22.0 ap371470
  • 22.0 ap357859
  • 22.0 ap374265
  • 22.0 ap374649
  • 22.0 ap350573
  • 22.0 ap383519
  • 22.0 ap380697
  • 22.0 ap357718
  • 22.0 ap367453
  • 22.0 ap376429
  • 22.0 ap355812
  • 22.0 ap355699
  • 23.0 ap349850
  • 22.0 ap362378
  • 22.0 ap370884
  • 22.0 ap368603
  • 22.0 ap370180
  • 22.0 ap355905
  • 23.0 ap368032
  • 22.0 ap356584
  • 23.0 ap364932
  • 22.0 ap360228
  • 23.0 ap378599
  • 22.0 ap355443
  • 23.0 ap370196
  • 23.0 ap379012
  • 23.0 ap367726
  • 22.0 ap368706
  • 22.0 ap381080
  • 23.0 ap373817
  • 23.0 ap377802
  • 22.0 ap373018
  • 22.0 ap376508
  • 22.0 ap356330
  • 22.0 ap381523
  • 22.0 ap357768
  • 23.0 ap375646
  • 22.0 ap383367
  • 22.0 ap351700
  • 22.0 ap358132
  • 22.0 ap374274
  • 23.0 ap369434
  • 22.0 ap380914
  • 22.0 ap380535
  • 22.0 ap355091
  • 22.0 ap358345
  • 23.0 ap368987
  • 22.0 ap358442
  • 22.0 ap362553
  • 22.0 ap372354
  • 23.0 ap366803
  • 23.0 ap379874
  • 22.0 ap355080
  • 22.0 ap357395
  • 23.0 ap367358
  • 22.0 ap375936
  • 22.0 ap372854
  • 22.0 ap365659
  • 22.0 ap352205
  • 23.0 ap376523
  • 22.0 ap359465
  • 23.0 ap374414
  • 22.0 ap383150
  • 22.0 ap366649
  • 22.0 ap369929
  • 23.0 ap372016
  • 22.0 ap376656
  • 23.0 ap366827
  • 22.0 ap370620
  • 23.0 ap373303
  • 23.0 ap375060
  • 22.0 ap353358
  • 22.0 ap360459
  • 23.0 ap382709
  • 23.0 ap374312
  • 23.0 ap366181
  • 22.0 ap369668
  • 22.0 ap375924
  • 23.0 ap369607
  • 22.0 ap374230
  • 22.0 ap378581
  • 22.0 ap380841
  • 23.0 ap375908
  • 22.0 ap353360
  • 22.0 ap362373
  • 23.0 ap381548
  • 22.0 ap364745
  • 22.0 ap359049
  • 23.0 ap367805
  • 22.0 ap367291
  • 22.0 ap365633
  • 23.0 ap383170
  • 22.0 ap383134
  • 23.0 ap374946
  • 23.0 ap377757
  • 22.0 ap353372
  • 23.0 ap379853
  • 23.0 ap370817
  • 22.0 ap352109
  • 23.0 ap371821
  • 22.0 ap378585
  • 22.0 ap371911
  • 22.0 ap372963
  • 22.0 ap365146
  • 23.0 ap378966
  • 23.0 ap375069
  • 22.0 ap373480
  • 22.0 ap364500
  • 22.0 ap361835
  • 23.0 ap367678
  • 22.0 ap354070
  • 22.0 ap366306
  • 22.0 ap353681
  • 22.0 ap370828
  • 22.0 ap354313
  • 22.0 ap364471
  • 22.0 ap379848
  • 22.0 ap374428
  • 22.0 ap368327
  • 22.0 ap382432
  • 22.0 ap360317
  • 23.0 ap368327
  • 22.0 ap356799
  • 22.0 ap380532
  • 22.0 ap377120
  • 22.0 ap360740
  • 22.0 ap370627
  • 22.0 ap381518
  • 22.0 ap382240
  • 22.0 ap374995
  • 23.0 ap376531
  • 22.0 ap370659
  • 23.0 ap365730
  • 22.0 ap380099
  • 23.0 ap381569
  • 22.0 ap379972
  • 23.0 ap375509
  • 23.0 ap366747
  • 22.0 ap352932
  • 23.0 ap372177
  • 22.0 ap365798
  • 22.0 ap382192
  • 22.0 ap359156
  • 23.0 ap379008
  • 23.0 ap369934
  • 22.0 ap358995
  • 23.0 ap382240
  • 23.0 ap379972
  • 22.0 ap359748
  • 22.0 ap364621
  • 23.0 ap380626
  • 22.0 ap378153
  • 23.0 ap373539
  • 22.0 ap370696
  • 23.0 ap370737
  • 23.0 ap378401
  • 22.0 ap376298
  • 22.0 ap367109
  • 23.0 ap382252
  • 23.0 ap379389
  • 22.0 ap357413
  • 22.0 ap372371
  • 22.0 ap374114
  • 22.0 ap345032
  • 22.0 ap355003
  • 22.0 ap382095
  • 22.0 ap365115
  • 23.0 ap373046
  • 23.0 ap367291
  • 22.0 ap379772
  • 23.0 ap382846
  • 22.0 ap365970
  • 22.0 ap363597
  • 22.0 ap376286
  • 22.0 ap362490
  • 22.0 ap367367
  • 22.0 ap372177
  • 23.0 ap372246
  • 22.0 ap372994
  • 23.0 ap369788
  • 22.0 ap377578
  • 23.0 ap378425
  • 22.0 ap371805
  • 22.0 ap362637
  • 22.0 ap368137
  • 23.0 ap369863
  • 22.0 ap372390
  • 22.0 ap380771
  • 22.0 ap368461
  • 23.0 ap378545
  • 23.0 ap378165
  • 22.0 ap379191
  • 22.0 ap364634
  • 22.0 ap355916
  • 22.0 ap370645
  • 23.0 ap377644
  • 22.0 ap377779
  • 23.0 ap369926
  • 23.0 ap381809
  • 22.0 ap380401
  • 23.0 ap375734
  • 22.0 ap376661
  • 22.0 ap382954
  • 22.0 ap381029
  • 23.0 ap361533
  • 22.0 ap380117
  • 22.0 ap378440
  • 23.0 ap376298
  • 23.0 ap364925
  • 23.0 ap376671
  • 22.0 ap374822
  • 22.0 ap366221
  • 22.0 ap370275
  • 23.0 ap374230
  • 23.0 ap380535
  • 22.0 ap373098
  • 23.0 ap373664
  • 23.0 ap368153
  • 22.0 ap354354
  • 23.0 ap372380
  • 23.0 ap366916
  • 22.0 ap381410
  • 23.0 ap382435
  • 22.0 ap380486
  • 22.0 ap361854
  • 22.0 ap352928
  • 22.0 ap382977
  • 23.0 ap367207
  • 23.0 ap367524
  • 22.0 ap370389
  • 23.0 ap368913
  • 22.0 ap363332
  • 23.0 ap374507
  • 22.0 ap380936
  • 23.0 ap369922
  • 22.0 ap367338
  • 22.0 ap377109
  • 22.0 ap350405
  • 23.0 ap376429
  • 23.0 ap365223
  • 22.0 ap365662
  • 22.0 ap354927
  • 23.0 ap373564
  • 22.0 ap377802
  • 22.0 ap360817
  • 22.0 ap364256
  • 23.0 ap371836
  • 22.0 ap355365
  • 22.0 ap368026
  • 22.0 ap372956
  • 22.0 ap381723
  • 23.0 ap373336
  • 22.0 ap370160
  • 23.0 ap377329
  • 22.0 ap372043
  • 23.0 ap366972
  • 22.0 ap358454
  • 23.0 ap380998
  • 22.0 ap376181
  • 22.0 ap376685
  • 23.0 ap374254
  • 23.0 ap368087
  • 22.0 ap375091
  • 22.0 ap368660
  • 23.0 ap366294
  • 22.0 ap352493
  • 22.0 ap380751
  • 22.0 ap358582
  • 23.0 ap378882
  • 23.0 ap375036
  • 22.0 ap363845
  • 22.0 ap378400
  • 22.0 ap362163
  • 22.0 ap366646
  • 22.0 ap352795
  • 22.0 ap361456
  • 23.0 ap378332
  • 22.0 ap356978
  • 22.0 ap367513
  • 22.0 ap365920
  • 23.0 ap371049
  • 23.0 ap374356
  • 22.0 ap372152
  • 22.0 ap378405
  • 22.0 ap369571
  • 22.0 ap373257
  • 23.0 ap366486
  • 23.0 ap374895
  • 23.0 ap382053
  • 23.0 ap376179
  • 23.0 ap366731
  • 22.0 ap374356
  • 23.0 ap372674
  • 22.0 ap357083
  • 22.0 ap365556
  • 22.0 ap358887
  • 23.0 ap371033
  • 22.0 ap372024
  • 22.0 ap381809
  • 22.0 ap352383
  • 22.0 ap368754
  • 23.0 ap382412
  • 22.0 ap365125
  • 22.0 ap375465
  • 23.0 ap372243
  • 22.0 ap371871
  • 23.0 ap345032
  • 23.0 ap377109
  • 22.0 ap360586
  • 22.0 ap352728
  • 22.0 ap357400
  • 22.0 ap373102
  • 22.0 ap376630
  • 22.0 ap371966
  • 22.0 ap354448
  • 22.0 ap375634
  • 23.0 ap376410
  • 23.0 ap366170
  • 22.0 ap377523
  • 22.0 ap368015
  • 22.0 ap359103
  • 23.0 ap376218
  • 23.0 ap375291
  • 23.0 ap374956
  • 23.0 ap366211
  • 22.0 ap376485
  • 22.0 ap380528
  • 23.0 ap372974
  • 23.0 ap369929
  • 23.0 ap369738
  • 23.0 ap374995
  • 22.0 ap357161
  • 22.0 ap362771
  • 22.0 ap372690
  • 22.0 ap375038
  • 23.0 ap368695
  • 22.0 ap359112
  • 23.0 ap359103
  • 22.0 ap379853
  • 23.0 ap375688
  • 22.0 ap365815
  • 23.0 ap378924
  • 22.0 ap348078
  • 22.0 ap371999
  • 23.0 ap373644
  • 22.0 ap354557
  • 22.0 ap366118
  • 22.0 ap367434
  • 22.0 ap352402
  • 23.0 ap375254
  • 23.0 ap368216
  • 22.0 ap372757
  • 22.0 ap380817
  • 23.0 ap363392
  • 22.0 ap376010
  • 22.0 ap373722
  • 22.0 ap368422
  • 23.0 ap366330
  • 23.0 ap354354
  • 23.0 ap351530
  • 23.0 ap378134
  • 23.0 ap381732
  • 23.0 ap383706
  • 22.0 ap381072
  • 22.0 ap356474
  • 23.0 ap374530
  • 22.0 ap375734
  • 22.0 ap361833
  • 22.0 ap363867
  • 22.0 ap358092
  • 22.0 ap374145
  • 22.0 ap362247
  • 22.0 ap374838
  • 22.0 ap373622
  • 22.0 ap375435
  • 22.0 ap353499
  • 23.0 ap376670
  • 23.0 ap371760
  • 23.0 ap376656
  • 22.0 ap371895
  • 23.0 ap369106
  • 23.0 ap370926
  • 22.0 ap382412
  • 23.0 ap381367
  • 22.0 ap382195
  • 22.0 ap373899
  • 22.0 ap353549
  • 22.0 ap377755
  • 22.0 ap360362
  • 23.0 ap380739
  • 22.0 ap356000
  • 22.0 ap370217
  • 23.0 ap381526
  • 23.0 ap379531
  • 22.0 ap370952
  • 23.0 ap378400
  • 22.0 ap369106
  • 22.0 ap378401
  • 22.0 ap369724
  • 22.0 ap367396
  • 23.0 ap376736
  • 22.0 ap377107
  • 22.0 ap358493
  • 22.0 ap363705
  • 23.0 ap375936
  • 22.0 ap352766
  • 22.0 ap355616
  • 22.0 ap361520
  • 22.0 ap356140
  • 23.0 ap374274
  • 22.0 ap358246
  • 22.0 ap360495
  • 22.0 ap362328
  • 22.0 ap364473
  • 22.0 ap370737
  • 22.0 ap381584
  • 22.0 ap362848
  • 23.0 ap367794
  • 23.0 ap372043
  • 22.0 ap354355
  • 22.0 ap370667
  • 22.0 ap353418
  • 23.0 ap380128
  • 23.0 ap368137
  • 22.0 ap371361
  • 23.0 ap379565
  • 22.0 ap367517
  • 23.0 ap365995
  • 23.0 ap383309
  • 22.0 ap382824
  • 22.0 ap380391
  • 23.0 ap372854
  • 23.0 ap369724
  • 23.0 ap365798
  • 22.0 ap365639
  • 22.0 ap357571
  • 22.0 ap370675
  • 23.0 ap370828
  • 22.0 ap359106
  • 22.0 ap356141
  • 23.0 ap369257
  • 23.0 ap366744
  • 23.0 ap367646
  • 22.0 ap353975
  • 23.0 ap380528
  • 23.0 ap363265
  • 23.0 ap381498
  • 22.0 ap370349
  • 22.0 ap363265
  • 22.0 ap352421
  • 22.0 ap372016
  • 23.0 ap381322
  • 22.0 ap375688
  • 22.0 ap369454
  • 23.0 ap370680
  • 22.0 ap362182
  • 22.0 ap365801
  • 23.0 ap378999
  • 23.0 ap375685
  • 22.0 ap353577
  • 22.0 ap359649
  • 22.0 ap352972
  • 22.0 ap373117
  • 22.0 ap381270
  • 22.0 ap355385
  • 22.0 ap375254
  • 22.0 ap352320
  • 22.0 ap372706
  • 23.0 ap375003
  • 23.0 ap373899
  • 23.0 ap379016
  • 23.0 ap382717
  • 22.0 ap357378
  • 22.0 ap349850
  • 22.0 ap353162
  • 22.0 ap360265
  • 22.0 ap363831
  • 22.0 ap359851
  • 22.0 ap357645
  • 23.0 ap377079
  • 23.0 ap382095
  • 22.0 ap379833
  • 23.0 ap379085
  • 23.0 ap376416
  • 23.0 ap372643
  • 22.0 ap359829
  • 22.0 ap361820
  • 22.0 ap372072
  • 22.0 ap370113
  • 22.0 ap355894
  • 22.0 ap378332
  • 22.0 ap355638
  • 22.0 ap379597
  • 22.0 ap382435
  • 23.0 ap373918
  • 22.0 ap378436
  • 22.0 ap366731
  • 22.0 ap353520
  • 23.0 ap377581
  • 22.0 ap383372
  • 22.0 ap353384
  • 23.0 ap378140
  • 22.0 ap372932
  • 23.0 ap374822
  • 22.0 ap381367
  • 22.0 ap380371
  • 23.0 ap374265
  • 23.0 ap375018
  • 22.0 ap361834
  • 23.0 ap378068
  • 22.0 ap377329
  • 22.0 ap383170
  • 23.0 ap373950
  • 22.0 ap364020
  • 22.0 ap363218
  • 23.0 ap365390
  • 22.0 ap376668
  • 22.0 ap363145
  • 23.0 ap374324
  • 23.0 ap382198
  • 23.0 ap366882
  • 22.0 ap370545
  • 23.0 ap382463
  • 23.0 ap370801
  • 23.0 ap368604
  • 23.0 ap378603
  • 23.0 ap373777
  • 22.0 ap359111
  • 23.0 ap382434
  • 23.0 ap371436
  • 22.0 ap378953
  • 22.0 ap357769
  • 22.0 ap359525
  • 22.0 ap372750
  • 23.0 ap364667
  • 22.0 ap366171
  • 22.0 ap377126
  • 22.0 ap364805
  • 22.0 ap380608
  • 22.0 ap373111
  • 22.0 ap379389
  • 23.0 ap371516
  • 23.0 ap378259
  • 23.0 ap369674
  • 23.0 ap374803
  • 22.0 ap355673
  • 22.0 ap377412
  • 22.0 ap375266
  • 22.0 ap374971
  • 22.0 ap376670
  • 22.0 ap362799
  • 23.0 ap372152
  • 22.0 ap374144
  • 22.0 ap358137
  • 22.0 ap383562
  • 22.0 ap379852
  • 22.0 ap365685
  • 22.0 ap369788
  • 23.0 ap375304
  • 22.0 ap374031
  • 23.0 ap364295
  • 23.0 ap378440
  • 22.0 ap353841
  • 22.0 ap365379
  • 23.0 ap368510
  • 22.0 ap375321
  • 22.0 ap376602
  • 22.0 ap380537
  • 22.0 ap358707
  • 23.0 ap369931
  • 22.0 ap361153
  • 22.0 ap365173
  • 22.0 ap364667
  • 22.0 ap370358
  • 22.0 ap354098
  • 22.0 ap372974
  • 23.0 ap365115
  • 22.0 ap362548
  • 22.0 ap376410
  • 23.0 ap366346
  • 22.0 ap355774
  • 23.0 ap383365
  • 23.0 ap382300
  • 23.0 ap374838
  • 22.0 ap354769
  • 23.0 ap383547
  • 22.0 ap361560
  • 23.0 ap373647
  • 23.0 ap369206
  • 22.0 ap354793
  • 22.0 ap374334
  • 23.0 ap371495
  • 22.0 ap371771
  • 22.0 ap362825
  • 22.0 ap376984
  • 23.0 ap372033
  • 22.0 ap356328
  • 22.0 ap379531
  • 22.0 ap374092
  • 23.0 ap365889
  • 22.0 ap354936
  • 22.0 ap355672
  • 22.0 ap361666
  • 23.0 ap380187
  • 22.0 ap348472
  • 22.0 ap370654
  • 23.0 ap373283
  • 23.0 ap380371
  • 22.0 ap375036
  • 22.0 ap379694
  • 23.0 ap360007
  • 22.0 ap377480
  • 23.0 ap369227
  • 22.0 ap379795
  • 23.0 ap371775
  • 23.0 ap373954
  • 23.0 ap371437
  • 23.0 ap382954
  • 22.0 ap343616
  • 23.0 ap381609
  • 22.0 ap378823
  • 22.0 ap355674
  • 22.0 ap365545
  • 23.0 ap366807
  • 22.0 ap375018
  • 23.0 ap374339
  • 22.0 ap381418
  • 23.0 ap378218
  • 23.0 ap379080
  • 22.0 ap375743
  • 22.0 ap369501
  • 22.0 ap356271
  • 22.0 ap366348
  • 22.0 ap370544
  • 22.0 ap380512
  • 23.0 ap379848
  • 22.0 ap365995
  • 22.0 ap361101
  • 23.0 ap381418
  • 22.0 ap378471
  • 22.0 ap371775
  • 22.0 ap356256
  • 22.0 ap380161
  • 23.0 ap352962
  • 22.0 ap364860
  • 22.0 ap382252
  • 23.0 ap374588
  • 23.0 ap372504
  • 23.0 ap377494
  • 22.0 ap365390
  • 23.0 ap366880
  • 22.0 ap357670
  • 22.0 ap359974
  • 23.0 ap367109
  • 22.0 ap365601
  • 22.0 ap359644
  • 22.0 ap356161
  • 23.0 ap379487
  • 22.0 ap364291
  • 22.0 ap371804
  • 23.0 ap376614
  • 23.0 ap374093
  • 22.0 ap376513
  • 23.0 ap371043
  • 23.0 ap375655
  • 23.0 ap381419
  • 22.0 ap377496
  • 22.0 ap381498
  • 23.0 ap367367
  • 22.0 ap367340
  • 22.0 ap353357
  • 22.0 ap379165
  • 22.0 ap376426
  • 22.0 ap378259
  • 22.0 ap364761
  • 22.0 ap378880
  • 22.0 ap370258
  • 22.0 ap359252
  • 22.0 ap376218
  • 22.0 ap364223
  • 22.0 ap351250
  • 22.0 ap383706
  • 23.0 ap380143
  • 23.0 ap366221
  • 22.0 ap371821
  • 22.0 ap373820
  • 22.0 ap354921
  • 23.0 ap377149
  • 22.0 ap360960
  • 22.0 ap380041
  • 22.0 ap365597
  • 22.0 ap376373
  • 23.0 ap375321
  • 23.0 ap377799
  • 23.0 ap375743
  • 22.0 ap382198
  • 22.0 ap375646
  • 23.0 ap377578
  • 22.0 ap353701
  • 22.0 ap376147
  • 23.0 ap379098
  • 22.0 ap382849
  • 23.0 ap373212
  • 23.0 ap370193
  • 23.0 ap380099
  • 23.0 ap366306
  • 22.0 ap381118
  • 23.0 ap383515
  • 23.0 ap376620
  • 22.0 ap354646
  • 22.0 ap352896
  • 22.0 ap358034
  • 23.0 ap373111
  • 23.0 ap370075
  • 23.0 ap379396
  • 22.0 ap363213
  • 22.0 ap352515
  • 22.0 ap365584
  • 22.0 ap363521
  • 23.0 ap373684
  • 22.0 ap380187
  • 22.0 ap369173
  • 23.0 ap372932
  • 22.0 ap364699
  • 22.0 ap371836
  • 22.0 ap373303
  • 23.0 ap378164
  • 23.0 ap364634
  • 22.0 ap366803
  • 23.0 ap366653
  • 23.0 ap377126
  • 22.0 ap355083
  • 22.0 ap378164
  • 23.0 ap376701
  • 22.0 ap372674
  • 23.0 ap372160
  • 23.0 ap366207
  • 22.0 ap366747
  • 23.0 ap374144
  • 23.0 ap366171
  • 22.0 ap374956
  • 22.0 ap376704
  • 22.0 ap381729
  • 22.0 ap359959
  • 22.0 ap373452
  • 23.0 ap371155
  • 23.0 ap375097
  • 23.0 ap375266
  • 22.0 ap359429
  • 23.0 ap381729
  • 22.0 ap361559
  • 22.0 ap353699
  • 23.0 ap373480
  • 22.0 ap364932
  • 22.0 ap360007
  • 22.0 ap371033
  • 22.0 ap367986
  • 23.0 ap373562
  • 22.0 ap378391
  • 22.0 ap379085
  • 22.0 ap374312
  • 23.0 ap382849
  • 22.0 ap362710
  • 23.0 ap377068
  • 23.0 ap371300
  • 22.0 ap376736
  • 22.0 ap362532
  • 22.0 ap365905
  • 22.0 ap362143
  • 22.0 ap354519
  • 22.0 ap370193
  • 22.0 ap382717
  • 23.0 ap378509
  • 23.0 ap367732
  • 23.0 ap378970
  • 22.0 ap381136
  • 22.0 ap370590
  • 23.0 ap373015
  • 23.0 ap379167
  • 22.0 ap373539
  • 23.0 ap368167
  • 22.0 ap359127
  • 22.0 ap371455
  • 22.0 ap372163
  • 22.0 ap375291
  • 22.0 ap354069
  • 22.0 ap377384
  • 22.0 ap365779
  • 22.0 ap378862
  • 22.0 ap381243
  • 22.0 ap380473
  • 22.0 ap369227
  • 22.0 ap368913
  • 22.0 ap372517
  • 22.0 ap375069
  • 22.0 ap366486
  • 22.0 ap376402
  • 23.0 ap381594
  • 23.0 ap376356
  • 23.0 ap382253
  • 22.0 ap365186
  • 23.0 ap371587
  • 22.0 ap373302
  • 22.0 ap376541
  • 23.0 ap380473
  • 23.0 ap376181
  • 22.0 ap371024
  • 22.0 ap374254
  • 23.0 ap380486
  • 23.0 ap372286
  • 23.0 ap371804
  • 22.0 ap366211
  • 22.0 ap373562
  • 22.0 ap369478
  • 22.0 ap377963
  • 22.0 ap358453
  • 22.0 ap379080
  • 22.0 ap352726
  • 22.0 ap360184
  • 22.0 ap361863
  • 23.0 ap377727
  • 22.0 ap370465
  • 22.0 ap353458
  • 22.0 ap369863
  • 22.0 ap356432
  • 23.0 ap366898
  • 23.0 ap366118
  • 22.0 ap370179
  • 22.0 ap370579
  • 22.0 ap364003
  • 22.0 ap375908
  • 23.0 ap374428
  • 22.0 ap366174
  • 22.0 ap382300
  • 22.0 ap377581
  • 23.0 ap372337
  • 22.0 ap373647
  • 22.0 ap376860
  • 22.0 ap372351
  • 23.0 ap377508
  • 23.0 ap367782
  • 22.0 ap369674
  • 22.0 ap370075
  • 23.0 ap378823
  • 22.0 ap366701
  • 22.0 ap355757
  • 22.0 ap358469
  • 22.0 ap366653
  • 22.0 ap370196
  • 23.0 ap369286
  • 23.0 ap376860
  • 22.0 ap368987
  • 22.0 ap369922
  • 23.0 ap367517
  • 22.0 ap357607
  • 23.0 ap375545
  • 23.0 ap366295
  • 22.0 ap358942
  • 23.0 ap370590
  • 22.0 ap376701
  • 22.0 ap358515
  • 22.0 ap378218
  • 23.0 ap363363
  • 23.0 ap382183
  • 22.0 ap375090
  • 23.0 ap362378
  • 22.0 ap366744
  • 23.0 ap376710
  • 22.0 ap351721
  • 23.0 ap370138
  • 22.0 ap372286
  • 22.0 ap374596
  • 23.0 ap372517
  • 22.0 ap378425
  • 23.0 ap378581
  • 23.0 ap372657
  • 22.0 ap354374
  • 22.0 ap369748
  • 22.0 ap371961
  • 23.0 ap384441
  • 23.0 ap383514
  • 23.0 ap384431
  • 23.0 ap384650
  • 23.0 ap384622
  • 23.0 ap384639
  • RI.2022.12
  • 23.0 ap384745
  • RI.2023.01
  • 23.0 ap384591
  • 23.0 ap384901
  • 23.0 ap384931
  • RI.2023.02
  • 23.0 ap384930
  • 23.0 ap384876
  • 23.0 ap385048
  • 23.0 ap385072
  • RI.2023.03
  • 23.0 ap385117
  • 23.0 ap385046
  • 23.0 ap385107
  • 23.0 ap385136
  • 23.0 ap385236
  • 23.0 ap385115
  • 23.0 ap385071
  • 23.0 ap385251
  • RI.2023.04
  • 23.0 ap385244
  • 23.0 ap385253
  • 23.0 ap384793
  • 23.0 ap385273
  • 23.0 ap385247
  • 23.0 ap385266
  • 23.0 ap384947
  • 23.0 ap385268
  • RI.2023.05
  • 23.0 ap385280
  • 23.0 ap385276
  • 23.0 ap385104
  • 23.0 ap385311
  • 23.0 ap385309
  • 21.sp1 ap352340
  • 21.sp1 ap358234
  • 21.sp1 ap352205
  • 21.sp1 ap353403
  • 21.sp1 ap347189
  • 21.sp1 ap339658
  • 21.0 ap348753
  • 21.sp1 ap348753
  • 21.0 ap349642
  • 21.sp1 ap344052
  • 21.0 ap363705
  • 21.sp1 ap364568
  • 21.sp1 ap361122
  • 21.sp1 ap364369
  • 21.sp1 ap352726
  • 21.0 ap345490
  • 21.sp1 ap349996
  • 21.sp1 ap349056
  • 21.sp1 ap356817
  • 21.sp1 ap367340
  • 21.sp1 ap357775
  • 21.sp1 ap342792
  • 21.sp1 ap345456
  • 21.sp1 ap355364
  • 21.sp1 ap363265
  • 21.sp1 ap366807
  • 21.0 ap240784
  • 21.sp1 ap351637
  • 21.0 ap351363
  • 21.sp1 ap341663
  • 21.0 ap343999
  • 21.sp1 ap349642
  • 21.sp1 ap244609
  • 21.sp1 ap345732
  • 21.sp1 ap361534
  • 21.0 ap366807
  • 21.0 ap356271
  • 21.sp1 ap358971
  • 21.sp1 ap370388
  • 21.0 ap354469
  • 21.sp1 ap346233
  • 21.sp1 ap346639
  • 21.0 ap350497
  • 21.0 ap245148
  • 21.sp1 ap344752
  • 21.sp1 ap375060
  • 21.0 ap341939
  • 21.sp1 ap243749
  • 21.sp1 ap351216
  • 21.0 ap347975
  • 21.sp1 ap349724
  • 21.sp1 ap360211
  • 21.0 ap354180
  • 21.sp1 ap343579
  • 21.sp1 ap245579
  • 21.sp1 ap215990
  • 21.0 ap355000
  • 21.sp1 ap360912
  • 21.sp1 ap351795
  • 21.sp1 ap357653
  • 21.0 ap345720
  • 21.0 ap348143
  • 21.sp1 ap347016
  • 21.0 ap235960
  • 21.sp1 ap366295
  • 21.sp1 ap369434
  • 21.sp1 ap354936
  • 21.sp1 ap353701
  • 21.0 ap338833
  • 21.0 ap339552
  • 21.sp1 ap339346
  • 21.0 ap356317
  • 21.sp1 ap363001
  • 21.sp1 ap361579
  • 21.0 ap361534
  • 21.0 ap354069
  • 21.0 ap346646
  • 21.0 ap349864
  • 21.sp1 ap349384
  • 21.0 ap363301
  • 21.0 ap355616
  • 21.sp1 ap339351
  • 21.sp1 ap343616
  • 21.0 ap348430
  • 21.0 ap344681
  • 21.0 ap352372
  • 21.sp1 ap349631
  • 21.sp1 ap350391
  • 21.sp1 ap342145
  • 21.0 ap355774
  • 21.sp1 ap350614
  • 21.sp1 ap342836
  • 21.sp1 ap354098
  • 21.sp1 ap355572
  • 21.sp1 ap346031
  • 21.0 ap350465
  • 21.sp1 ap353464
  • 21.sp1 ap351530
  • 21.0 ap350859
  • 21.0 ap244609
  • 21.sp1 ap346386
  • 21.sp1 ap372337
  • 21.0 ap350204
  • 21.sp1 ap352421
  • 21.sp1 ap338964
  • 21.sp1 ap361883
  • 21.0 ap351835
  • 21.0 ap349699
  • 21.0 ap339351
  • 21.0 ap339477
  • 21.sp1 ap342284
  • 21.sp1 ap356328
  • 21.0 ap342324
  • 21.0 ap351294
  • 21.0 ap364358
  • 21.sp1 ap342755
  • 21.0 ap355091
  • 21.sp1 ap360966
  • 21.0 ap345054
  • 21.sp1 ap353842
  • 21.sp1 ap356145
  • 21.0 ap347158
  • 21.sp1 ap346577
  • 21.sp1 ap350303
  • 21.0 ap338964
  • 21.0 ap350111
  • 21.sp1 ap364667
  • 21.0 ap341897
  • 21.sp1 ap343408
  • 21.0 ap361520
  • 21.sp1 ap365889
  • 21.sp1 ap358034
  • 21.sp1 ap351487
  • 21.sp1 ap356747
  • 21.sp1 ap351295
  • 21.0 ap366373
  • 21.0 ap355095
  • 21.0 ap359536
  • 21.sp1 ap348012
  • 21.sp1 ap354918
  • 21.sp1 ap348565
  • 21.sp1 ap242497
  • 21.sp1 ap354785
  • 21.0 ap348156
  • 21.sp1 ap339196
  • 21.0 ap357087
  • 21.sp1 ap344485
  • 21.sp1 ap242300
  • 21.sp1 ap349390
  • 21.0 ap351263
  • 21.sp1 ap356164
  • 21.sp1 ap363584
  • 21.sp1 ap373777
  • 21.0 ap358640
  • 21.sp1 ap359764
  • 21.sp1 ap357395
  • 21.sp1 ap342625
  • 21.sp1 ap351721
  • 21.0 ap339209
  • 21.0 ap353549
  • 21.0 ap347562
  • 21.sp1 ap362553
  • 21.sp1 ap355717
  • 21.sp1 ap364206
  • 21.sp1 ap364510
  • 21.0 ap347016
  • 21.0 ap363228
  • 21.sp1 ap345054
  • 21.0 ap352969
  • 21.sp1 ap365597
  • 21.0 ap345013
  • 21.sp1 ap359433
  • 21.sp1 ap347959
  • 21.sp1 ap374557
  • 21.sp1 ap366118
  • 21.sp1 ap346307
  • 21.0 ap341645
  • 21.0 ap351988
  • 21.sp1 ap346646
  • 21.sp1 ap379387
  • 21.0 ap356503
  • 21.sp1 ap351835
  • 21.sp1 ap367732
  • 21.sp1 ap344969
  • 21.0 ap344100
  • 21.sp1 ap349023
  • 21.sp1 ap235252
  • 21.0 ap366320
  • 21.sp1 ap346064
  • 21.sp1 ap369206
  • 21.0 ap359145
  • 21.0 ap351637
  • 21.0 ap354557
  • 21.0 ap347640
  • 21.sp1 ap356141
  • 21.sp1 ap345261
  • 21.sp1 ap348100
  • 21.sp1 ap344020
  • 21.sp1 ap352997
  • 21.0 ap338981
  • 21.sp1 ap346562
  • 21.0 ap345732
  • 21.sp1 ap343877
  • 21.sp1 ap347172
  • 21.sp1 ap368399
  • 21.0 ap361854
  • 21.sp1 ap350050
  • 21.0 ap342899
  • 21.sp1 ap345490
  • 21.0 ap350110
  • 21.sp1 ap341939
  • 21.0 ap354052
  • 21.0 ap351961
  • 21.sp1 ap349210
  • 21.sp1 ap348430
  • 21.sp1 ap360259
  • 21.sp1 ap342483
  • 21.sp1 ap347330
  • 21.sp1 ap346261
  • 21.sp1 ap352515
  • 21.sp1 ap342548
  • 21.0 ap350308
  • 21.0 ap346253
  • 21.sp1 ap356317
  • 21.sp1 ap358726
  • 21.0 ap342853
  • 21.0 ap346147
  • 21.sp1 ap372043
  • 21.sp1 ap364004
  • 21.0 ap242497
  • 21.sp1 ap359974
  • 21.sp1 ap356474
  • 21.sp1 ap355091
  • 21.sp1 ap350141
  • 21.sp1 ap354052
  • 21.0 ap354793
  • 21.0 ap342284
  • 21.0 ap355699
  • 21.sp1 ap350420
  • 21.sp1 ap355912
  • 21.sp1 ap365971
  • 21.sp1 ap351754
  • 21.0 ap338988
  • 21.0 ap347246
  • 21.sp1 ap348107
  • 21.sp1 ap362298
  • 21.sp1 ap366744
  • 21.0 ap348107
  • 21.sp1 ap345246
  • 21.0 ap367732
  • 21.0 ap215990
  • 21.0 ap339658
  • 21.0 ap357571
  • 21.0 ap344752
  • 21.sp1 ap350573
  • 21.sp1 ap371921
  • 21.sp1 ap373102
  • 21.sp1 ap345293
  • 21.sp1 ap347548
  • 21.sp1 ap359646
  • 21.0 ap349066
  • 21.sp1 ap362532
  • 21.sp1 ap346128
  • 21.sp1 ap359644
  • 21.0 ap343495
  • 21.sp1 ap361560
  • 21.0 ap349206
  • 21.0 ap343017
  • 21.sp1 ap347640
  • 21.0 ap247533
  • 21.sp1 ap358642
  • 21.0 ap363845
  • 21.sp1 ap369173
  • 21.sp1 ap344100
  • 21.0 ap359829
  • 21.sp1 ap358345
  • 21.sp1 ap365167
  • 21.0 ap339781
  • 21.sp1 ap352109
  • 21.sp1 ap375355
  • 21.sp1 ap375931
  • 21.0 ap339342
  • 21.sp1 ap349872
  • 21.sp1 ap359752
  • 21.0 ap350189
  • 21.sp1 ap365633
  • 21.0 ap365632
  • 21.sp1 ap355000
  • 21.0 ap344043
  • 21.sp1 ap362163
  • 21.0 ap356817
  • 21.0 ap355107
  • 21.sp1 ap345873
  • 21.0 ap347330
  • 21.sp1 ap375674
  • 21.sp1 ap374822
  • 21.0 ap349872
  • 21.sp1 ap366348
  • 21.sp1 ap356787
  • 21.sp1 ap351934
  • 21.sp1 ap375053
  • 21.0 ap348473
  • 21.sp1 ap245441
  • 21.sp1 ap353418
  • 21.0 ap342696
  • 21.sp1 ap363128
  • 21.sp1 ap373914
  • 21.sp1 ap364670
  • 21.0 ap354646
  • 21.0 ap359227
  • 21.sp1 ap339538
  • 21.sp1 ap343352
  • 21.0 ap348142
  • 21.sp1 ap350465
  • 21.sp1 ap351961
  • 21.sp1 ap369926
  • 21.sp1 ap344681
  • 21.0 ap350090
  • 21.0 ap356164
  • 21.0 ap346379
  • 21.0 ap352421
  • 21.0 ap360459
  • 21.0 ap357161
  • 21.sp1 ap374649
  • 21.0 ap342836
  • 21.0 ap346128
  • 21.sp1 ap365798
  • 21.0 ap348367
  • 21.sp1 ap357574
  • 21.sp1 ap358399
  • 21.0 ap358411
  • 21.sp1 ap363560
  • 21.sp1 ap356424
  • 21.sp1 ap345850
  • 21.0 ap359030
  • 21.sp1 ap363695
  • 21.sp1 ap342060
  • 21.sp1 ap350164
  • 21.sp1 ap345729
  • 21.sp1 ap350179
  • 21.sp1 ap351263
  • 21.0 ap346307
  • 21.0 ap358942
  • 21.sp1 ap348034
  • 21.0 ap342175
  • 21.sp1 ap354413
  • 21.0 ap352515
  • 21.sp1 ap358132
  • 21.sp1 ap350474
  • 21.sp1 ap350884
  • 21.sp1 ap379440
  • 21.sp1 ap363846
  • 21.sp1 ap348531
  • 21.sp1 ap371804
  • 21.0 ap347189
  • 21.sp1 ap359112
  • 21.0 ap356584
  • 21.0 ap358582
  • 21.0 ap342588
  • 21.0 ap346900
  • 21.sp1 ap346900
  • 21.sp1 ap351701
  • 21.0 ap356145
  • 21.sp1 ap350204
  • 21.0 ap361876
  • 21.sp1 ap352372
  • 21.sp1 ap361055
  • 21.sp1 ap349011
  • 21.0 ap365889
  • 21.sp1 ap366747
  • 21.sp1 ap345477
  • 21.sp1 ap350456
  • 21.0 ap359085
  • 21.0 ap350143
  • 21.sp1 ap362593
  • 21.0 ap349617
  • 21.0 ap356231
  • 21.sp1 ap366486
  • 21.sp1 ap366320
  • 21.sp1 ap339395
  • 21.0 ap365167
  • 21.0 ap344270
  • 21.0 ap350591
  • 21.0 ap360966
  • 21.sp1 ap364473
  • 21.0 ap346639
  • 21.sp1 ap339568
  • 21.sp1 ap342461
  • 21.sp1 ap364384
  • 21.0 ap365170
  • 21.0 ap346554
  • 21.0 ap358889
  • 21.0 ap354098
  • 21.sp1 ap367461
  • 21.0 ap353839
  • 21.sp1 ap339376
  • 21.0 ap346074
  • 21.sp1 ap343495
  • 21.0 ap361883
  • 21.sp1 ap366268
  • 21.sp1 ap354050
  • 21.sp1 ap363597
  • 21.sp1 ap347562
  • 21.sp1 ap351495
  • 21.sp1 ap242893
  • 21.sp1 ap349863
  • 21.0 ap346559
  • 21.0 ap340168
  • 21.sp1 ap342975
  • 21.sp1 ap355107
  • 21.sp1 ap351014
  • 21.0 ap347741
  • 21.sp1 ap357571
  • 21.sp1 ap363146
  • 21.sp1 ap341577
  • 21.sp1 ap347741
  • 21.sp1 ap352766
  • 21.sp1 ap350763
  • 21.sp1 ap339781
  • 21.0 ap355003
  • 21.0 ap338965
  • 21.sp1 ap373814
  • 21.sp1 ap353549
  • 21.sp1 ap354707
  • 21.0 ap346347
  • 21.0 ap243749
  • 21.sp1 ap346347
  • 21.0 ap345246
  • 21.sp1 ap361420
  • 21.sp1 ap355699
  • 21.sp1 ap348952
  • 21.0 ap349867
  • 21.0 ap345069
  • 21.sp1 ap364158
  • 21.sp1 ap351248
  • 21.sp1 ap347534
  • 21.sp1 ap346724
  • 21.sp1 ap354474
  • 21.sp1 ap373349
  • 21.sp1 ap361308
  • 21.sp1 ap348431
  • 21.0 ap348633
  • 21.sp1 ap344043
  • 21.0 ap354413
  • 21.sp1 ap363705
  • 21.sp1 ap342696
  • 21.0 ap360306
  • 21.sp1 ap346862
  • 21.sp1 ap351894
  • 21.0 ap345452
  • 21.0 ap352766
  • 21.sp1 ap350832
  • 21.sp1 ap349206
  • 21.sp1 ap356375
  • 21.sp1 ap361641
  • 21.sp1 ap367325
  • 21.sp1 ap342217
  • 21.sp1 ap359956
  • 21.0 ap349724
  • 21.sp1 ap346074
  • 21.sp1 ap342853
  • 21.0 ap351478
  • 21.sp1 ap361863
  • 21.sp1 ap350613
  • 21.sp1 ap342220
  • 21.sp1 ap370620
  • 21.sp1 ap338833
  • 21.sp1 ap244265
  • 21.sp1
  • 21.sp1 ap339206
  • 21.sp1 ap344954
  • 21.0 ap354707
  • 21.sp1 ap359076
  • 21.0 ap346376
  • 21.sp1 ap348104
  • 21.0 ap360600
  • 21.0 ap245468
  • 21.sp1 ap361412
  • 21.0 ap352972
  • 21.0 ap342946
  • 21.sp1 ap367782
  • 21.sp1 ap233247
  • 21.sp1 ap345627
  • 21.sp1 ap245148
  • 21.sp1 ap358942
  • 21.sp1 ap355385
  • 21.sp1 ap342899
  • 21.sp1 ap354646
  • 21.sp1 ap364358
  • 21.sp1 ap351294
  • 21.0 ap364510
  • 21.0 ap352320
  • 21.sp1 ap343351
  • 21.sp1 ap351988
  • 21.sp1 ap339209
  • 21.sp1 ap361520
  • 21.sp1 ap246656
  • 21.sp1 ap365632
  • 21.0 ap345261
  • 21.sp1 ap339236
  • 21.sp1 ap360325
  • 21.0 ap348945
  • 21.sp1 ap355875
  • 21.sp1 ap360306
  • 21.0 ap353841
  • 21.0 ap339395
  • 21.0 ap357607
  • 21.0 ap235252
  • 21.sp1 ap345633
  • 21.sp1 ap363228
  • 21.0 ap354936
  • 21.sp1 ap338972
  • 21.sp1 ap341471
  • 21.sp1 ap361153
  • 21.sp1 ap351363
  • 21.0 ap359470
  • 21.sp1 ap359589
  • 21.0 ap353418
  • 21.0 ap343352
  • 21.sp1 ap348037
  • 21.sp1 ap339552
  • 21.sp1 ap348633
  • 21.0 ap348093
  • 21.sp1 ap354069
  • 21.sp1 ap347905
  • 21.sp1 ap347302
  • 21.0 ap348078
  • 21.sp1 ap374265
  • 21.sp1 ap348740
  • 21.0 ap349859
  • 21.sp1 ap346559
  • 21.sp1 ap342175
  • 21.sp1 ap360771
  • 21.sp1 ap379554
  • 21.0 ap356458
  • 21.sp1 ap342127
  • 21.0 ap343877
  • 21.0 ap356328
  • 21.sp1 ap344479
  • 21.sp1 ap370196
  • 21.0 ap341471
  • 21.sp1 ap338988
  • 21.0 ap338972
  • 21.sp1 ap340054
  • 21.0 ap346622
  • 21.sp1 ap365449
  • 21.sp1 ap353354
  • 21.0 ap351721
  • 21.sp1 ap359911
  • 21.sp1 ap359023
  • 21.0 ap344253
  • 21.sp1 ap346622
  • 21.sp1 ap365556
  • 21.sp1 ap372454
  • 21.sp1 ap349589
  • 21.sp1 ap357197
  • 21.sp1 ap360459
  • 21.sp1 ap359085
  • 21.0 ap343410
  • 21.sp1 ap349859
  • 21.sp1 ap338879
  • 21.sp1 ap342474
  • 21.sp1 ap345548
  • 21.0 ap357653
  • 21.sp1 ap344094
  • 21.0 ap351700
  • 21.sp1 ap358563
  • 21.0 ap350613
  • 21.0 ap364473
  • 21.sp1 ap362825
  • 21.sp1 ap361854
  • 21.sp1 ap341645
  • 21.0 ap342771
  • 21.0 ap347302
  • 21.sp1 ap348462
  • 21.sp1 ap355894
  • 21.0 ap346183
  • 21.0 ap341350
  • 21.sp1 ap346376
  • 21.0 ap343408
  • 21.sp1 ap349221
  • 21.sp1 ap378970
  • 21.0 ap349996
  • 21.sp1 ap354789
  • 21.sp1 ap355581
  • 21.sp1 ap341908
  • 21.sp1 ap359685
  • 21.0 ap345627
  • 21.0 ap363584
  • 21.sp1 ap359145
  • 21.0 ap363560
  • 21.sp1 ap359227
  • 21.sp1 ap359030
  • 21.sp1 ap371527
  • 21.0 ap339376
  • 21.sp1 ap354469
  • 21.0 ap345633
  • 21.0 ap243808
  • 21.0 ap244020
  • 21.sp1 ap350338
  • 21.0 ap348472
  • 21.sp1 ap354927
  • 21.sp1 ap338981
  • 21.0 ap344969
  • 21.sp1 ap366803
  • 21.0 ap344052
  • 21.sp1 ap339897
  • 21.sp1 ap361945
  • 21.sp1 ap345738
  • 21.0 ap359729
  • 21.0 ap348034
  • 21.sp1 ap359465
  • 21.0 ap359076
  • 21.sp1 ap347930
  • 21.0 ap347896
  • 21.sp1 ap348367
  • 21.0 ap246656
  • 21.sp1 ap362317
  • 21.0 ap339538
  • 21.sp1 ap345452
  • 21.0 ap348012
  • 21.sp1 ap375061
  • 21.sp1 ap363363
  • 21.sp1 ap354494
  • 21.sp1 ap364003
  • 21.sp1 ap360586
  • 21.0 ap358893
  • 21.sp1 ap339342
  • 21.0 ap350491
  • 21.sp1 ap357718
  • 21.sp1 ap354964
  • 21.0 ap244595
  • 21.sp1 ap244595
  • 21.sp1 ap364879
  • 21.sp1 ap373813
  • 21.sp1 ap358095
  • 21.sp1 ap359959
  • 21.sp1 ap355855
  • 21.sp1 ap356458
  • 21.0 ap342217
  • 21.0 ap363146
  • 21.sp1 ap347685
  • 21.sp1 ap347603
  • 21.0 ap355673
  • 21.sp1 ap346379
  • 21.sp1 ap360931
  • 21.0 ap342625
  • 21.sp1 ap344253
  • 21.0 ap343351
  • 21.sp1 ap351644
  • 21.sp1 ap357768
  • 21.sp1 ap360600
  • 21.sp1 ap349617
  • 21.sp1 ap370801
  • 21.sp1 ap350111
  • 21.0 ap351644
  • 21.0 ap354494
  • 21.sp1 ap348156
  • 21.sp1 ap357161
  • 21.0 ap344020
  • 21.0 ap339196
  • 21.sp1 ap354331
  • 21.sp1 ap361820
  • 21.sp1 ap348945
  • 21.0 ap342220
  • 21.sp1 ap341897
  • 21.sp1 ap350143
  • 21.sp1 ap249376
  • 21.0 ap245579
  • 21.sp1 ap343017
  • 21.0 ap354964
  • 21.0 ap244265
  • 21.0 ap349056
  • 21.sp1 ap348878
  • 21.sp1 ap375026
  • 21.0 ap344094
  • 21.sp1 ap357083
  • 21.sp1 ap349443
  • 21.sp1 ap364256
  • 21.sp1 ap358469
  • 21.sp1 ap375465
  • 21.0 ap353842
  • 21.0 ap348100
  • 21.0 ap354474
  • 21.0 ap342975
  • 21.0 ap345755
  • 21.0 ap350884
  • 21.0 ap355385
  • 21.0 ap358469
  • 21.sp1 ap358101
  • 21.sp1 ap352972
  • 21.sp1 ap357047
  • 21.sp1 ap364062
  • 21.sp1 ap359729
  • 21.sp1 ap350189
  • 21.sp1 ap348143
  • 21.0 ap340054
  • 21.sp1 ap366370
  • 21.0 ap356474
  • 21.0 ap364384
  • 21.0 ap350141
  • 21.sp1 ap357607
  • 21.sp1 ap349864
  • 21.sp1 ap353843
  • 21.sp1 ap342543
  • 21.0 ap338879
  • 21.0 ap242300
  • 21.sp1 ap357769
  • 21.sp1 ap366211
  • 21.sp1 ap245468
  • 21.sp1 ap345059
  • 21.0 ap358563
  • 21.0 ap339200
  • 21.sp1 ap372842
  • 21.sp1 ap359119
  • 21.sp1 ap343675
  • 21.sp1 ap354531
  • 21.sp1 ap366373
  • 21.sp1 ap363301
  • 21.sp1 ap352087
  • 21.sp1 ap240784
  • 21.sp1 ap349867
  • 21.sp1 ap344952
  • 21.sp1 ap339200
  • 21.0 ap349210
  • 21.0 ap351216
  • 21.sp1 ap344422
  • 21.sp1 ap343999
  • 21.0 ap364471
  • 21.sp1 ap371030
  • 21.sp1 ap367524
  • 21.sp1 ap344945
  • 21.sp1 ap360993
  • 21.sp1 ap365186
  • 21.0 ap346076
  • 21.sp1 ap374145
  • 21.sp1 ap358641
  • 21.0 ap356787
  • 21.sp1 ap348564
  • 21.sp1 ap361590
  • 21.sp1 ap356231
  • 21.0 ap346386
  • 21.sp1 ap355673
  • 21.0 ap358234
  • 21.0 ap350478
  • 21.sp1 ap373015
  • 21.sp1 ap347246
  • 21.sp1 ap342782
  • 21.0 ap364369
  • 21.sp1 ap362637
  • 21.sp1 ap349383
  • 21.0 ap358345
  • 21.sp1 ap349066
  • 21.0 ap342145
  • 21.0 ap343445
  • 21.0 ap358101
  • 21.sp1 ap345720
  • 21.sp1 ap352795
  • 21.sp1 ap350591
  • 21.0 ap359589
  • 21.0 ap346902
  • 21.sp1 ap363218
  • 21.sp1 ap355638
  • 21.0 ap249383
  • 21.sp1 ap353499
  • 21.sp1 ap350859
  • 21.0 ap352728
  • 21.sp1 ap349699
  • 21.0 ap354785
  • 21.sp1 ap365390
  • 21.sp1 ap361821
  • 21.0 ap339568
  • 21.sp1 ap343445
  • 21.sp1 ap340730
  • 21.sp1 ap348527
  • 21.sp1 ap342588
  • 21.sp1 ap351704
  • 21.0 ap351701
  • 21.sp1 ap342771
  • 21.sp1 ap370636
  • 21.sp1 ap367794
  • 21.sp1 ap365730
  • 21.0
  • 21.sp1 ap375036
  • 21.sp1 ap379847
  • 21.sp1 ap359470
  • 21.0 ap359646
  • 21.sp1 ap365584
  • 21.sp1 ap355095
  • 21.sp1 ap346632
  • 21.0 ap354331
  • 21.0 ap361590
  • 21.0 ap352795
  • 21.0 ap366118
  • 21.sp1 ap348142
  • 21.sp1 ap348078
  • 21.sp1 ap354793
  • 21.0 ap344952
  • 21.0 ap344945
  • 21.0 ap356978
  • 21.sp1 ap349703
  • 21.sp1 ap366731
  • 21.sp1 ap358861
  • 21.sp1 ap365662
  • 21.sp1 ap353841
  • 21.sp1 ap344964
  • 21.0 ap366290
  • 21.sp1 ap358137
  • 21.sp1 ap346607
  • 21.sp1 ap341498
  • 21.sp1 ap347158
  • 21.sp1 ap373786
  • 21.sp1 ap346902
  • 21.sp1 ap365170
  • 21.sp1 ap366880
  • 21.sp1 ap363729
  • 21.0 ap351160
  • 21.sp1 ap244020
  • 21.sp1 ap380473
  • 21.0 ap352896
  • 21.0 ap346562
  • 21.sp1 ap348093
  • 21.sp1 ap352320
  • 21.0 ap366295
  • 21.sp1 ap344238
  • 21.0 ap364670
  • 21.0 ap350338
  • 21.sp1 ap360893
  • 21.sp1 ap338965
  • 21.sp1 ap353839
  • 21.0 ap346085
  • 21.sp1 ap355003
  • 21.0 ap345850
  • 21.0 ap340730
  • 21.0 ap341908
  • 21.sp1 ap358731
  • 21.0 ap346607
  • 21.0 ap350614
  • 21.sp1 ap360907
  • 21.sp1 ap356978
  • 21.0 ap351898
  • 21.0 ap242893
  • 21.0 ap339346
  • 21.sp1 ap358893
  • 21.0 ap355904
  • 21.sp1 ap366298
  • 21.sp1 ap357049
  • 21.sp1 ap365970
  • 21.0 ap342792
  • 21.sp1 ap349850
  • 21.sp1 ap346554
  • 21.sp1 ap340168
  • 21.sp1 ap358019
  • 21.0 ap347172
  • 21.0 ap353701
  • 21.sp1 ap342028
  • 21.sp1 ap373899
  • 21.0 ap359752
  • 21.sp1 ap346337
  • 21.sp1 ap367998
  • 21.sp1 ap359829
  • 21.0 ap345293
  • 21.sp1 ap361559
  • 21.sp1 ap368497
  • 21.sp1 ap345069
  • 21.sp1 ap342324
  • 21.sp1 ap362961
  • 21.sp1 ap348086
  • 21.sp1 ap351700
  • 21.sp1 ap373950
  • 21.sp1 ap344290
  • 21.sp1 ap358730
  • 21.sp1 ap347983
  • 21.sp1 ap350379
  • 21.0 ap347930
  • 21.0 ap343616
  • 21.0 ap365730
  • 21.0 ap343864
  • 21.sp1 ap347975
  • 21.sp1 ap355774
  • 21.0 ap349390
  • 21.0 ap342669
  • 21.sp1 ap343883
  • 21.sp1 ap344600
  • 21.sp1 ap355616
  • 21.sp1 ap364471
  • 21.sp1 ap355825
  • 21.0 ap357083
  • 21.sp1 ap360373
  • 21.sp1 ap354755
  • 21.sp1 ap342669
  • 21.0 ap347603
  • 21.0 ap360586
  • 21.0 ap360912
  • 21.sp1 ap358889
  • 21.sp1 ap364239
  • 21.sp1 ap247533
  • 21.sp1 ap345755
  • 21.0 ap355825
  • 21.0 ap342719
  • 21.sp1 ap351160
  • 21.sp1 ap379473
  • 21.sp1 ap355904
  • 21.0 ap361533
  • 21.0 ap339206
  • 21.sp1 ap350584
  • 21.sp1 ap343229
  • 21.sp1 ap350497
  • 21.sp1 ap346253
  • 21.0 ap346577
  • 21.sp1 ap346183
  • 21.0 ap350474
  • 21.sp1 ap351898
  • 21.sp1 ap364243
  • 21.sp1 ap352728
  • 21.0 ap343927
  • 21.0 ap352109
  • 21.0 ap249376
  • 21.sp1 ap243808
  • 21.sp1 ap344270
  • 21.sp1 ap343927
  • 21.0 ap353843
  • 21.sp1 ap370654
  • 21.sp1 ap358582
  • 21.sp1 ap352969
  • 21.0 ap359465
  • 21.0 ap342483
  • 21.sp1 ap347506
  • 21.sp1 ap359536
  • 21.0 ap346261
  • 21.sp1 ap352402
  • 21.sp1 ap339477
  • 21.0 ap347905
  • 21.0 ap362532
  • 21.sp1 ap356503
  • 21.0 ap347685
  • 21.sp1 ap352082
  • 21.sp1 ap361338
  • 21.sp1 ap358411
  • 21.sp1 ap369219
  • 21.sp1 ap233913
  • 21.0 ap355638
  • 21.sp1 ap350491
  • 21.0 ap350303
  • 21.sp1 ap367109
  • 21.0 ap355894
  • 21.sp1 ap364559
  • 21.sp1 ap354090
  • 21.sp1 ap353520
  • 21.sp1 ap343410
  • 21.sp1 ap365379
  • 21.sp1 ap358640
  • 21.sp1 ap378258
  • 21.0 ap353499
  • 21.sp1 ap350308
  • 21.sp1 ap366290
  • 21.sp1 ap349222
  • 21.sp1 ap235960
  • 21.sp1 ap360295
  • 21.0 ap362825
  • 21.sp1 ap364898
  • 21.0 ap359433
  • 21.0 ap347548
  • 21.0 ap349850
  • 21.sp1 ap362848
  • 21.sp1 ap347896
  • 21.0 ap347506
  • 21.0 ap342461
  • 21.0 ap362637
  • 21.sp1 ap353406
  • 21.0 ap245441
  • 21.sp1 ap346085
  • 21.sp1 ap357670
  • 21.sp1 ap364304
  • 21.sp1 ap368604
  • 21.sp1 ap345013
  • 21.sp1 ap348891
  • 21.sp1 ap373276
  • 21.sp1 ap343864
  • 21.0 ap350573
  • 21.sp1 ap354454
  • 21.0 ap361412
  • 21.sp1 ap358578
  • 21.0 ap345738
  • 21.sp1 ap350090
  • 21.0 ap344083
  • 21.sp1 ap341350
  • 21.sp1 ap342719
  • 21.0 ap364879
  • 21.0 ap343579
  • 21.sp1 ap355027
  • 21.0 ap348431
  • 21.0 ap342060
  • 21.sp1 ap346129
  • 21.0 ap339897
  • 21.sp1 ap354355
  • 21.sp1 ap352896
  • 21.sp1 ap348472
  • 21.0 ap346724
  • 21.0 ap361559
  • 21.sp1 ap372351
  • 21.0 ap349384
  • 21.0 ap355027
  • 21.sp1 ap358508
  • 21.sp1 ap344083
  • 21.sp1 ap358887
  • 21.sp1 ap354557
  • 21.sp1 ap342946
  • 21.sp1 ap354180
  • 21.sp1 ap359808
  • 21.sp1 ap350110
  • 21.0 ap343675
  • 21.sp1 ap352806
  • 21.sp1 ap249383
  • 21.sp1 ap354559
  • 21.sp1 ap372110
  • 21.0 ap352340
  • 21.sp1 ap346076
  • 21.sp1 ap369132
  • 21.0 ap358726
  • 21.sp1 ap359172
  • 21.sp1 ap355914
  • 21.sp1 ap374144
  • 21.0 ap358019
  • 21.sp1 ap356271
  • 21.sp1 ap356584
  • 21.sp1 ap357087
  • 21.sp1 ap360265
  • 21.0 ap359119
  • 21.sp1 ap361533
  • 21.sp1 ap363845
  • 21.0 ap345059
  • 21.0 ap348527
  • 21.sp1 ap361876
  • 23.0 ap385283
  • 23.0 ap385314
  • 23.0 ap385274
  • 23.0 ap385318
  • 23.0 ap385327
  • 23.0 ap385334
  • RI.2023.07
  • 23.0 ap385341
  • 23.0 ap385329
  • 23.0 ap385346
  • 23.0 ap385351
  • RI.2023.08
  • 23.0 ap385360
  • 23.0 ap385355
  • 23.0 ap385333
  • 23.0 ap385368
  • 23.0 ap385370
  • 23.0 ap385366
  • 23.0 ap385373
  • 23.0 ap385379
  • RI.2023.09
  • 23.0 ap385380
  • 23.0 ap385330
  • 23.0 ap385352
  • 23.0 ap385384
  • 23.0 ap385390
  • 23.0 ap385389
  • 23.0 ap385396
  • 23.0 ap385399
  • RI.2023.10
  • 23.0 ap385404
  • 23.0 ap385374
  • 23.0 ap385413
  • 23.0 ap385407
  • 23.0 ap385395
  • 23.0 ap385405
  • RI.2023.11
  • 23.0 ap385429
  • 23.0 ap385430
  • 23.0 ap385444
  • RI.2023.12
  • 23.0 ap385441
  • 23.0 ap385424
  • 23.0 ap385453
  • RI.2024.01
  • 23.0 ap385472
  • 23.0 ap385459
  • RI.2024.02
  • 23.0 ap385475
  • RI.2024.03
  • 23.0 ap385487
  • 23.0 ap385507
  • RI.2024.04
  • RI.2024.05
  • 23.0 ap385528
  • RI.2024.06
  • RI.2024.07
  • RI.2024.08
  • RI.2024.09
  • RI.2024.10
Problem Types
TypeCWE IDDescription
cweCWE-789Uncontrolled Memory Allocation
Type: cwe
CWE ID: CWE-789
Description: Uncontrolled Memory Allocation
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt
N/A
https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
N/A
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt
Resource: N/A
Hyperlink: https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
Resource: N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@cisco.com
Published At:22 Jan, 2025 | 17:15
Updated At:06 Aug, 2025 | 20:02

A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition. This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Cisco Systems, Inc.
cisco
>>broadworks_network_server>>Versions before 2024.11(exclusive)
cpe:2.3:a:cisco:broadworks_network_server:*:*:*:*:release_independent:*:*:*
Weaknesses
CWE IDTypeSource
CWE-789Primarypsirt@cisco.com
CWE ID: CWE-789
Type: Primary
Source: psirt@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.htmlpsirt@cisco.com
Not Applicable
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmtpsirt@cisco.com
Vendor Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphApsirt@cisco.com
Not Applicable
Hyperlink: https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
Source: psirt@cisco.com
Resource:
Not Applicable
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt
Source: psirt@cisco.com
Resource:
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
Source: psirt@cisco.com
Resource:
Not Applicable

Change History

0
Information is not available yet

Similar CVEs

251Records found

CVE-2020-3596
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.60% / 68.37%
||
7 Day CHG~0.00%
Published-08 Oct, 2020 | 04:20
Updated-13 Nov, 2024 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Expressway Series and TelePresence Video Communication Server Denial of Service Vulnerability

A vulnerability in the Session Initiation Protocol (SIP) of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect handling of incoming SIP traffic. An attacker could exploit this vulnerability by sending a series of SIP packets to an affected device. A successful exploit could allow the attacker to exhaust memory on an affected device, causing it to crash and leading to a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-expresswaytelepresence_video_communication_serverCisco TelePresence Video Communication Server (VCS) Expressway
CWE ID-CWE-789
Memory Allocation with Excessive Size Value
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2023-20108
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.24% / 47.28%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-02 Aug, 2024 | 08:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the XCP Authentication Service of the Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to cause a temporary service outage for all Cisco Unified CM IM&P users who are attempting to authenticate to the service, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted login message to the affected device. A successful exploit could allow the attacker to cause an unexpected restart of the authentication service, preventing new users from successfully authenticating. Exploitation of this vulnerability does not impact Cisco Unified CM IM&P users who were authenticated prior to an attack.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_manager_im_and_presence_serviceCisco Unified Communications Manager IM and Presence Service
CWE ID-CWE-789
Memory Allocation with Excessive Size Value
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2022-20947
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.15% / 36.12%
||
7 Day CHG~0.00%
Published-10 Nov, 2022 | 17:29
Updated-03 Aug, 2024 | 02:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to improper processing of HostScan data received from the Posture (HostScan) module. An attacker could exploit this vulnerability by sending crafted HostScan data to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseadaptive_security_appliance_softwareCisco Firepower Threat Defense SoftwareCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-20760
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-2.59% / 85.00%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 03:15
Updated-06 Nov, 2024 | 16:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software DNS Inspection Denial of Service Vulnerability

A vulnerability in the DNS inspection handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service condition (DoS) on an affected device. This vulnerability is due to a lack of proper processing of incoming requests. An attacker could exploit this vulnerability by sending crafted DNS requests at a high rate to an affected device. A successful exploit could allow the attacker to cause the device to stop responding, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseadaptive_security_appliance_softwareCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-20946
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.20% / 41.74%
||
7 Day CHG~0.00%
Published-10 Nov, 2022 | 17:29
Updated-03 Aug, 2024 | 02:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory handling error that occurs when GRE traffic is processed. An attacker could exploit this vulnerability by sending a crafted GRE payload through an affected device. A successful exploit could allow the attacker to cause the device to restart, resulting in a DoS condition. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2017-6627
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-10.89% / 93.11%
||
7 Day CHG~0.00%
Published-07 Sep, 2017 | 21:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xeCisco IOS and Cisco IOS XEIOS and IOS XE Software
CWE ID-CWE-404
Improper Resource Shutdown or Release
CVE-2017-3857
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.14% / 77.54%
||
7 Day CHG~0.00%
Published-22 Mar, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Layer 2 Tunneling Protocol (L2TP) parsing function of Cisco IOS (12.0 through 12.4 and 15.0 through 15.6) and Cisco IOS XE (3.1 through 3.18) could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient validation of L2TP packets. An attacker could exploit this vulnerability by sending a crafted L2TP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS or Cisco IOS XE Software if the L2TP feature is enabled for the device and the device is configured as an L2TP Version 2 (L2TPv2) or L2TP Version 3 (L2TPv3) endpoint. By default, the L2TP feature is not enabled. Cisco Bug IDs: CSCuy82078.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xeCisco IOS and IOS XE
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-399
Not Available
CVE-2020-16139
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-90.39% / 99.58%
||
7 Day CHG~0.00%
Published-12 Aug, 2020 | 20:10
Updated-04 Aug, 2024 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial-of-service in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers restart the device remotely through sending specially crafted packets. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. For more information on this, and how to upgrade, refer to the CVE’s reference information

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_ip_conference_station_7937g_firmwareunified_ip_conference_station_7937gn/aunified_ip_conference_station_7937g_firmware
CVE-2017-12235
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-7.63% / 91.49%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

A vulnerability in the implementation of the PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco IOS 12.2 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper parsing of ingress PN-DCP Identify Request packets destined to an affected device. An attacker could exploit this vulnerability by sending a crafted PN-DCP Identify Request packet to an affected device and then continuing to send normal PN-DCP Identify Request packets to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to process PROFINET messages. Beginning with Cisco IOS Software Release 12.2(52)SE, PROFINET is enabled by default on all the base switch module and expansion-unit Ethernet ports. Cisco Bug IDs: CSCuz47179.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-industrial_ethernet_2000_4t-g-l_switchindustrial_ethernet_2000_4ts-b_switchindustrial_ethernet_2000_16t67-b_switchindustrial_ethernet_2000_4s-ts-g-l_switchindustrial_ethernet_2000_16tc-g-e_switchindustrial_ethernet_2000_8tc-g-l_switchindustrial_ethernet_2000_4t-g-b_switchiosindustrial_ethernet_2000_4ts-l_switchindustrial_ethernet_2000_8tc-g-e_switchindustrial_ethernet_2000_16tc-g-x_switchindustrial_ethernet_2000_4s-ts-g-b_switchindustrial_ethernet_2000_8t67-b_switchindustrial_ethernet_2000_24t67-b_switchindustrial_ethernet_2000_16ptc-g-nx_switchindustrial_ethernet_2000_4ts-g-l_switchindustrial_ethernet_2000_16t67p-g-e_switchindustrial_ethernet_2000_series_firmwareindustrial_ethernet_2000_16ptc-g-e_switchindustrial_ethernet_2000_16tc-g-l_switchindustrial_ethernet_2000_8tc-g-b_switchindustrial_ethernet_2000_8t67p-g-e_switchindustrial_ethernet_2000_16tc-l_switchindustrial_ethernet_2000_8tc-l_switchindustrial_ethernet_2000_4t-b_switchindustrial_ethernet_2000_4t-l_switchindustrial_ethernet_2000_8tc-b_switchindustrial_ethernet_2000_16ptc-g-l_switchindustrial_ethernet_2000_8tc-g-n_switchindustrial_ethernet_2000_4ts-g-b_switchindustrial_ethernet_2000_16tc-g-n_switchCisco IOSIOS software
CWE ID-CWE-20
Improper Input Validation
CVE-2021-40117
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.84% / 73.72%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 18:56
Updated-07 Nov, 2024 | 21:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Denial of Service Vulnerability

A vulnerability in SSL/TLS message handler for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because incoming SSL/TLS packets are not properly processed. An attacker could exploit this vulnerability by sending a crafted SSL/TLS packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-adaptive_security_appliance_softwareasa_5585-x_firmwareasa_5505_firmwareasa_5580_firmwareasa_5515-xasa_5545-x_firmwareadaptive_security_applianceasa_5545-xasa_5525-x_firmwareasa_5505asa_5555-xasa_5580asa_5585-xasa_5515-x_firmwareasa_5525-xasa_5555-x_firmwareasa_5512-x_firmwareasa_5512-xfirepower_threat_defenseCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-40116
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.78% / 72.80%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 18:56
Updated-07 Jul, 2025 | 12:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Cisco Products Snort Rule Denial of Service Vulnerability

Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centersnortfirepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-241
Improper Handling of Unexpected Data Type
CVE-2017-12234
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-10.01% / 92.76%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-1000_integrated_services_router1841_integrated_service_router1117-4pwe1100-4g\/6g_integrated_services_router1117-4plteeawe11201801_integrated_service_routercatalyst_ie3200_rugged_switch1100-4gltegb_integrated_services_routerioscatalyst_ie3400_rugged_switch1100-8p_integrated_services_router1100-6g_integrated_services_router1109-2p1111x-8p1101-4p1811_integrated_service_router1111-4pwe1941_integrated_services_router1113-8pmwe1101-4p_integrated_services_router1113-8pwe1921_integrated_services_router1802_integrated_service_routeresr-6300-ncp-k91100_integrated_services_router1100-4p_integrated_services_router1100-4pesr-6300-con-k91100-4g_integrated_services_router1116-4plteeawe1803_integrated_service_router1111-8pwb1109-4p1120_connected_grid_router1100-4gltena_integrated_services_router1160_integrated_services_router1120_integrated_services_router1906c_integrated_services_router1941w_integrated_services_routercatalyst_ie3300_rugged_switch1812_integrated_service_router1100-8pcatalyst_ie3400_heavy_duty_switch1861_integrated_service_router1101_integrated_services_router1131_integrated_services_router1117-4pmlteeawe1100-lte_integrated_services_routercatalyst_ie93001905_integrated_services_router1117-4pmwe1100_terminal_services_gateways1113-8plteeawe1116-4pweCisco IOSIOS software
CWE ID-CWE-20
Improper Input Validation
CVE-2011-2057
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.10% / 77.16%
||
7 Day CHG~0.00%
Published-22 Oct, 2011 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The cat6000-dot1x component in Cisco IOS 12.2 before 12.2(33)SXI7 does not properly handle (1) a loop between a dot1x enabled port and an open-authentication dot1x enabled port and (2) a loop between a dot1x enabled port and a non-dot1x port, which allows remote attackers to cause a denial of service (traffic storm) via unspecified vectors that trigger many Spanning Tree Protocol (STP) Bridge Protocol Data Unit (BPDU) frames, aka Bug ID CSCtq36327.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-34698
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.52% / 65.71%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:46
Updated-07 Nov, 2024 | 21:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability

A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asyncosweb_security_appliance_s190web_security_appliance_s690web_security_appliance_s680web_security_appliance_s690xweb_security_appliance_s170web_security_appliance_s390web_security_appliance_s380Cisco Web Security Appliance (WSA)
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2021-34783
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.30% / 52.63%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 18:55
Updated-07 Nov, 2024 | 21:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Software-Based SSL/TLS Denial of Service Vulnerability

A vulnerability in the software-based SSL/TLS message handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient validation of SSL/TLS messages when the device performs software-based SSL/TLS decryption. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: Datagram TLS (DTLS) messages cannot be used to exploit this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-adaptive_security_appliance_softwareasa_5585-x_firmwareasa_5505_firmwareasa_5580_firmwareasa_5515-xasa_5545-x_firmwareasa_5545-xasa_5525-x_firmwareasa_5505asa_5555-xasa_5580asa_5515-x_firmwareasa_5525-xasa_5555-x_firmwareasa_5585-xasa_5512-x_firmwareasa_5512-xfirepower_threat_defenseCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-20
Improper Input Validation
CVE-2021-34781
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.43% / 61.66%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 18:55
Updated-07 Nov, 2024 | 21:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software SSH Connections Denial of Service Vulnerability

A vulnerability in the processing of SSH connections for multi-instance deployments of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to a lack of proper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, which causes a DoS condition on the affected device. The device must be manually reloaded to recover.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_management_center_virtual_appliancefirepower_threat_defensesourcefire_defense_centerCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2021-34792
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.43% / 61.73%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 18:56
Updated-07 Nov, 2024 | 21:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Resource Exhaustion Denial of Service Vulnerability

A vulnerability in the memory management of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management when connection rates are high. An attacker could exploit this vulnerability by opening a significant number of connections on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-adaptive_security_appliance_softwareasa_5585-x_firmwareasa_5505_firmwareasa_5580_firmwareasa_5515-xasa_5545-x_firmwareasa_5545-xasa_5525-x_firmwareasa_5505asa_5555-xasa_5580asa_5515-x_firmwareasa_5525-xasa_5555-x_firmwareasa_5585-xasa_5512-x_firmwareasa_5512-xfirepower_threat_defenseCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2012-0381
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-3.52% / 87.16%
||
7 Day CHG~0.00%
Published-29 Mar, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.2 and IOS XE 2.1.x through 2.6.x and 3.1.xS through 3.4.xS before 3.4.2S, 3.5.xS before 3.5.1S, and 3.2.xSG before 3.2.2SG allows remote attackers to cause a denial of service (device reload) by sending IKE UDP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCts38429.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xen/a
CVE-2011-3288
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.53% / 66.13%
||
7 Day CHG~0.00%
Published-06 Oct, 2011 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Unified Presence before 8.5(4) does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption, and process crash) via a crafted XML document containing a large number of nested entity references, aka Bug IDs CSCtq89842 and CSCtq88547, a similar issue to CVE-2003-1564.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_presencen/a
CWE ID-CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
CVE-2011-1640
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.53% / 66.13%
||
7 Day CHG~0.00%
Published-22 Oct, 2011 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ethernet-lldp component in Cisco IOS 12.2 before 12.2(33)SXJ1 does not properly support a large number of LLDP Management Address (MA) TLVs, which allows remote attackers to cause a denial of service (device crash) via crafted LLDPDUs, aka Bug ID CSCtj22354.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2011-2058
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.53% / 66.13%
||
7 Day CHG~0.00%
Published-22 Oct, 2011 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The cat6000-dot1x component in Cisco IOS 12.2 before 12.2(33)SXI7 does not properly handle an external loop between a pair of dot1x enabled ports, which allows remote attackers to cause a denial of service (traffic storm) via unspecified vectors that trigger many unicast EAPoL Protocol Data Units (PDUs), aka Bug ID CSCtq36336.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2004-0079
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.27% / 83.98%
||
7 Day CHG~0.00%
Published-18 Mar, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.

Action-Not Available
Vendor-sco4dlitebluecoatneoterisstonesofttarantellasecurecomputingn/aAvaya LLCNovellSun Microsystems (Oracle Corporation)Symantec CorporationCisco Systems, Inc.Apple Inc.HP Inc.Check Point Software Technologies Ltd.Silicon Graphics, Inc.OpenBSDRed Hat, Inc.Dell Inc.FreeBSD FoundationOpenSSLVMware (Broadcom Inc.)
Product-wbemfirewall_services_moduleapplication_and_content_networking_softwareaaa_servers8700okena_stormwatchmac_os_xthreat_responseapache-based_web_serverpix_firewallpropacks8500provider-1call_managerciscoworks_common_management_foundationclientless_vpn_gateway_4400secure_content_acceleratorvsus8300stonebeat_fullclustergsx_serverfirewall-1access_registrarstonebeat_securityclustergss_4480_global_site_selectortarantella_enterprisestonegate_vpn_clientproxysgvpn-1mac_os_x_serverenterprise_linux_desktopmds_9000enterprise_linuxwebstaropenserverbsafe_ssl-jioswebnssg203css11000_content_services_switchopenssllinuxintuity_audixserverclustersg5openbsdsg208sg200cacheos_ca_sastonegateciscoworks_common_servicesgss_4490_global_site_selectorimanagerinstant_virtual_extranetedirectorysidewinderhp-uxconverged_communications_serverstonebeat_webclustercrypto_accelerator_4000speed_technologies_litespeed_web_serverfreebsdpix_firewall_softwarecontent_services_switch_11500css_secure_content_acceleratorn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2010-3048
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.66% / 70.06%
||
7 Day CHG~0.00%
Published-16 Jan, 2020 | 17:15
Updated-15 Nov, 2024 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Unified Personal Communicator 7.0 (1.13056) does not free allocated memory for received data and does not perform validation if memory allocation is successful, causing a remote denial of service condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_personal_communicatorUnified Personal Communicator
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2010-3035
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-3.50% / 87.12%
||
7 Day CHG-2.26%
Published-30 Aug, 2010 | 20:00
Updated-30 Jul, 2025 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-15||Apply updates per vendor instructions.

Cisco IOS XR 3.4.0 through 3.9.1, when BGP is enabled, does not properly handle unrecognized transitive attributes, which allows remote attackers to cause a denial of service (peering reset) via a crafted prefix announcement, as demonstrated in the wild in August 2010 with attribute type code 99, aka Bug ID CSCti62211.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ios_xrn/aIOS XR
CVE-2017-12237
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-10.85% / 93.09%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-catalyst_3850-24t-scatalyst_3850-nm-2-40g1000_integrated_services_routerasr_1009-xcatalyst_8300catalyst_3650-48fs-eintegrated_services_virtual_routercatalyst_3850-24xs-scatalyst_3650-24ts-lcatalyst_3850-12s-e1100_integrated_services_routercatalyst_3650-24ps-scatalyst_3650-48fd-scatalyst_8300-2n2s-4t2xcatalyst_9800catalyst_3650-48fq-scatalyst_3650-48fq-l1109-2p_integrated_services_routercatalyst_9300-48t-ecatalyst_3650-48pd-lcatalyst_9300-48t-acatalyst_9300l-48t-4g-a8201-32fh9800-lcatalyst_3650-48tq-ecatalyst_3650-48ps-lcatalyst_3850-48xs-ecatalyst_9300-24s-a4321_integrated_services_router4351_integrated_services_routercatalyst_9300l-24t-4g-ecatalyst_82001841_integrated_service_routercatalyst_3650-12x48uzcatalyst_3850-48p-sasr_1000-xcatalyst_3850-48f-ecatalyst_3650-24pdcatalyst_9300-24t-acatalyst_3650-48td-easr_1001-hxcatalyst_3850-24t-lesr63008101-32hcatalyst_85004451-x_integrated_services_routercatalyst_9300-48uxm-ecatalyst_3650-48fd-lcatalyst_3850-48t-lcatalyst_3850-nm-8-10gcatalyst_9300l-24p-4g-a8831catalyst_9300-24u-acatalyst_3850-12x48ucatalyst_3650-24ps-e8201catalyst_3650-24pd-ecatalyst_3850-48t-ecatalyst_9800-cl1812_integrated_service_routercatalyst_8500lcatalyst_3650-48td-lcatalyst_9200asr_1001-hx_rasr_1006-x4431_integrated_services_routercatalyst_3650-48td-scatalyst_9300-24s-ecatalyst_3650-8x24uq-lcatalyst_8300-1n1s-4t2xcatalyst_9300l-24t-4x-a1100-4g\/6g_integrated_services_router1801_integrated_service_router1100-4gltegb_integrated_services_routercatalyst_3850-24xu-l1811_integrated_service_router8800_8-slotcatalyst_9300lcatalyst_9800-lcatalyst_3650-12x48ur-scatalyst_3650-24td-sasr_10138800_4-slotcatalyst_3650-48fqesr-6300-con-k99800-clcatalyst_9300l-48p-4g-acatalyst_9300-24p-ecatalyst_9300-48un-acatalyst_96008808catalyst_95001160_integrated_services_router1941w_integrated_services_router1906c_integrated_services_routercatalyst_ie3300_rugged_switchcatalyst_3650-12x48uq-sios_xecatalyst_3850-24ucatalyst_3650-48pd-ecatalyst_3850-16xs-s4321\/k9-ws_integrated_services_routercatalyst_3650-48tq-scatalyst_3850-48ucatalyst_9600xcatalyst_9300l-48t-4x-acatalyst_3650-24pdm-ecatalyst_3850-32xs-e4221_integrated_services_routercatalyst_3650-48ts-l82121100-8p_integrated_services_routercatalyst_9300l-48t-4g-ecatalyst_9300l-48t-4x-ecatalyst_3650-12x48uq-lcatalyst_3850-48p-lcatalyst_3650-48pq-e1111x_integrated_services_routercatalyst_9300lmcatalyst_8510csr1109-4p_integrated_services_routercatalyst_3850-24t-ecatalyst_3850-24xu-e8818catalyst_3650-12x48uz-scatalyst_3850-48u-lcatalyst_3850-24s-scatalyst_3850-24u-scatalyst_3650-24pd-scatalyst_3650-48fqm-ecatalyst_9300l-48p-4g-ecatalyst_3650catalyst_3850-12s-s4321\/k9_integrated_services_routercatalyst_9300-24t-e9800-40catalyst_3650-12x48ur-ecatalyst_9300l-24p-4x-e4321\/k9-rf_integrated_services_routercatalyst_9300-48u-acatalyst_9800-l-fasr_1002-xcatalyst_3650-12x48ur-lcatalyst_8300-1n1s-6tcatalyst_ie3200_rugged_switchcatalyst_3650-24pdm-lasr_10001100-6g_integrated_services_routercatalyst_3650-8x24uq-ecatalyst_3650-12x48uz-ecatalyst_9300l-48p-4x-acatalyst_8500-4qccatalyst_3850-24pw-sesr-6300-ncp-k9catalyst_3650-12x48fd-scatalyst_3850-48xs-s8218catalyst_9300-48u-ecatalyst_3850-48t-scatalyst_3850-24xu-scatalyst_3850-48f-lcatalyst_3850catalyst_9600_supervisor_engine-18101-32fhasr_1002-hxcatalyst_3650-12x48uq8102-64h4331_integrated_services_routercatalyst_3650-8x24uq-scatalyst_3650-48pq-lcatalyst_3650-48fs-l4331\/k9_integrated_services_routercatalyst_ie93001905_integrated_services_router4351\/k9-ws_integrated_services_routercatalyst_9200lcatalyst_3650-24ps-lcatalyst_8540msr82028800_18-slotcatalyst_9300-48s-a422_integrated_services_routercatalyst_3850-32xs-sasr_1002-x_rcatalyst_9407rcatalyst_3650-24td-ecatalyst_ie3400_rugged_switchcatalyst_3850-48xs-f-ecbr-8_converged_broadband_router8800_12-slotcatalyst_3650-24td-lcatalyst_9300-24ux-e1111x-8p_integrated_services_routercatalyst_3850-24p-ecatalyst_3650-12x48uz-lcatalyst_3850-24p-scatalyst_9300-24u-e1101-4p_integrated_services_routercatalyst_3650-48tq-lcatalyst_3850-24s-ecatalyst_3850-24xuasr_1023catalyst_3650-24pd-lcatalyst_9300l-24p-4g-ecatalyst_3850-24u-l1100-4p_integrated_services_routercatalyst_3850-24u-e4331\/k9-ws_integrated_services_router4351\/k9_integrated_services_router4331\/k9-rf_integrated_services_router1109_integrated_services_routercatalyst_3650-48fd-e8812catalyst_3650-48fs-scatalyst_3850-48pw-s1101_integrated_services_router8804catalyst_3850-12xs-scatalyst_3650-12x48urcatalyst_3850-24xscatalyst_9300-24ux-acatalyst_8540csrcatalyst_9400_supervisor_engine-1catalyst_3650-8x24uqcatalyst_3650-48ts-scatalyst_9200cxcatalyst_9300l-24t-4g-acatalyst_3650-8x24pd-scatalyst_8510msrioscatalyst_3850-48xscatalyst_3850-48p-ecatalyst_3850-48u-ecatalyst_9300l_stackcatalyst_3650-48fq-ecatalyst_3850-48xs-f-scatalyst_3850-24p-lcatalyst_9300-48p-acatalyst_9300-48p-e4351\/k9-rf_integrated_services_routerasr_1001-xcatalyst_9300-48un-ecatalyst_3650-24ts-e1100-4g_integrated_services_router4461_integrated_services_router44461_integrated_services_routercatalyst_9300-24p-acatalyst_9400catalyst_9300-48s-e1100-4gltena_integrated_services_router1120_integrated_services_routercatalyst_9300l-24t-4x-ecatalyst_9300xcatalyst_3850-24xs-ecatalyst_3850-48f-s1861_integrated_service_routercatalyst_3650-8x24pd-ecatalyst_9300-48uxm-a1100-lte_integrated_services_routercatalyst_9500hcatalyst_9300l-48p-4x-ecatalyst_3650-48fqm-scatalyst_3850-12xs-e1240_connected_grid_routercatalyst_3650-48fqm-lasr_1002-hx_rasr_1001catalyst_3650-48pq-scatalyst_3650-48fqmcatalyst_9300catalyst_3650-12x48fd-l1941_integrated_services_routercatalyst_3650-48pd-s1921_integrated_services_router1802_integrated_service_routercatalyst_3650-8x24pd-lcatalyst_9300l-24p-4x-acatalyst_3650-12x48uq-e4000_integrated_services_router8208asr_1001-x_rasr_1004catalyst_3650-48ps-e4451_integrated_services_routerasr_10061803_integrated_service_routercatalyst_3650-24ts-scatalyst_3650-24pdmcatalyst_3650-48ps-scatalyst_9800-l-ccatalyst_3650-48ts-ecatalyst_3850-16xs-e9800-80catalyst_ie3400_heavy_duty_switchcatalyst_3850-48u-s1131_integrated_services_routercatalyst_3650-12x48fd-ecatalyst_3650-24pdm-scatalyst_8300-2n2s-6tcatalyst_9410rasr_1002Cisco IOS and IOS XEIOS and IOS XE Software
CVE-2024-20500
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.15% / 36.56%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 18:23
Updated-04 Jun, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device. This vulnerability is due to insufficient resource management when establishing TLS/SSL sessions. An attacker could exploit this vulnerability by sending a series of crafted TLS/SSL messages to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meraki_mx84meraki_mx64w_firmwaremeraki_mx600_firmwaremeraki_mx105meraki_mx250meraki_mx450meraki_mx105_firmwaremeraki_mx450_firmwaremeraki_z4cmeraki_z3c_firmwaremeraki_z3cmeraki_mx68cw_firmwaremeraki_mx100_firmwaremeraki_mx65meraki_mx85meraki_mx95_firmwaremeraki_z4c_firmwaremeraki_mx67cmeraki_mx85_firmwaremeraki_mx64_firmwaremeraki_mx95meraki_mx100meraki_mx68cwmeraki_z3_firmwaremeraki_mx75meraki_mx68w_firmwaremeraki_mx64wmeraki_mx250_firmwaremeraki_mx68meraki_mx67c_firmwaremeraki_mx68wmeraki_vmx_firmwaremeraki_mx400meraki_mx67wmeraki_mx65wmeraki_mx75_firmwaremeraki_mx67w_firmwaremeraki_z4_firmwaremeraki_mx600meraki_mx67meraki_z4meraki_z3meraki_mx64meraki_vmxmeraki_mx67_firmwaremeraki_mx65w_firmwaremeraki_mx68_firmwaremeraki_mx400_firmwaremeraki_mx65_firmwaremeraki_mx84_firmwareCisco Meraki MX Firmwaremeraki_z1meraki_mx
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-20436
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.72% / 71.57%
||
7 Day CHG+0.17%
Published-25 Sep, 2024 | 16:26
Updated-08 Oct, 2024 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the HTTP Server feature of Cisco IOS XE Software when the Telephony Service feature is enabled could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a null pointer dereference when accessing specific URLs. An attacker could exploit this vulnerability by sending crafted HTTP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, causing a DoS condition on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Softwareios_xe
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2024-20499
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.08% / 25.19%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 18:23
Updated-04 Jun, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device. These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meraki_mx84meraki_mx64w_firmwaremeraki_mx600_firmwaremeraki_mx105meraki_mx250meraki_mx450meraki_mx105_firmwaremeraki_mx450_firmwaremeraki_z4cmeraki_z3c_firmwaremeraki_z3cmeraki_mx68cw_firmwaremeraki_mx100_firmwaremeraki_mx65meraki_mx85meraki_mx95_firmwaremeraki_z4c_firmwaremeraki_mx67cmeraki_mx85_firmwaremeraki_mx64_firmwaremeraki_mx95meraki_mx100meraki_mx68cwmeraki_z3_firmwaremeraki_mx75meraki_mx68w_firmwaremeraki_mx64wmeraki_mx250_firmwaremeraki_mx68meraki_mx67c_firmwaremeraki_mx68wmeraki_vmx_firmwaremeraki_mx400meraki_mx67wmeraki_mx65wmeraki_mx75_firmwaremeraki_mx67w_firmwaremeraki_z4_firmwaremeraki_mx600meraki_mx67meraki_z4meraki_z3meraki_mx64meraki_vmxmeraki_mx67_firmwaremeraki_mx65w_firmwaremeraki_mx68_firmwaremeraki_mx400_firmwaremeraki_mx65_firmwaremeraki_mx84_firmwareCisco Meraki MX Firmwaremeraki_z1meraki_mx
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20502
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.10% / 27.30%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 18:23
Updated-04 Jun, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to insufficient resource management while establishing SSL VPN sessions. An attacker could exploit this vulnerability by sending a series of crafted HTTPS requests to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meraki_mx84meraki_mx64w_firmwaremeraki_mx600_firmwaremeraki_mx105meraki_mx250meraki_mx450meraki_mx105_firmwaremeraki_mx450_firmwaremeraki_z4cmeraki_z3c_firmwaremeraki_z3cmeraki_mx68cw_firmwaremeraki_mx100_firmwaremeraki_mx65meraki_mx85meraki_mx95_firmwaremeraki_z4c_firmwaremeraki_mx67cmeraki_mx64_firmwaremeraki_mx85_firmwaremeraki_mx95meraki_mx100meraki_mx68cwmeraki_z3_firmwaremeraki_mx75meraki_mx68w_firmwaremeraki_mx64wmeraki_mx250_firmwaremeraki_mx68meraki_mx67c_firmwaremeraki_mx68wmeraki_vmx_firmwaremeraki_mx400meraki_mx67wmeraki_mx65wmeraki_mx75_firmwaremeraki_mx67w_firmwaremeraki_z4_firmwaremeraki_mx600meraki_mx67meraki_z4meraki_z3meraki_mx64meraki_vmxmeraki_mx67_firmwaremeraki_mx65w_firmwaremeraki_mx68_firmwaremeraki_mx400_firmwaremeraki_mx65_firmwaremeraki_mx84_firmwareCisco Meraki MX Firmwaremeraki_z1meraki_mx
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-20304
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.10% / 27.53%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 16:39
Updated-03 Oct, 2024 | 14:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software Packet Memory Exhaustion Vulnerability

A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device. This vulnerability exists because the Mtrace2 code does not properly handle packet memory. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to exhaust the incoming UDP packet memory. The affected device would not be able to process higher-level UDP-based protocols packets, possibly causing a denial of service (DoS) condition. Note: This vulnerability can be exploited using IPv4 or IPv6.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Softwareios_xr
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2024-20375
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.33% / 55.57%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 17:02
Updated-01 Aug, 2025 | 20:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the SIP call processing function of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper parsing of SIP messages. An attacker could exploit this vulnerability by sending a crafted SIP message to an affected Cisco Unified CM or Cisco Unified CM SME device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition that interrupts the communications of reliant voice and video devices.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_managerCisco Unified Communications Manager
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20433
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.44% / 62.24%
||
7 Day CHG+0.11%
Published-25 Sep, 2024 | 16:26
Updated-03 Oct, 2024 | 13:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a buffer overflow when processing crafted RSVP packets. An attacker could exploit this vulnerability by sending RSVP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeiosCisco IOS XE SoftwareIOSios_xe
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20451
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.09% / 26.89%
||
7 Day CHG~0.00%
Published-07 Aug, 2024 | 16:48
Updated-23 Aug, 2024 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA300 Series IP Phones and Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly. These vulnerabilities exist because HTTP packets are not properly checked for errors. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the remote interface of an affected device. A successful exploit could allow the attacker to cause a DoS condition on the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-spa_501g_firmwarespa_509g_firmwarespa_514g_4-line_ip_phonespa_508g_firmwarespa_301_1_line_ip_phonespa_525g2_5-line_ip_phonespa_303_3_line_ip_phonespa_514g_firmwarespa_525g2_firmwarespa_508g_8-line_ip_phonespa_301_firmwarespa_512g_firmwarespa_504g_4-line_ip_phonespa_303_firmwarespa_502g_1-line_ip_phonespa_504g_firmwarespa_525g_5-line_ip_phonespa_502g_firmwarespa_501g_8-line_ip_phonespa_509g_12-line_ip_phonespa_512g_1-line_ip_phonespa_525g_firmwareCisco Small Business IP Phones
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-20311
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.17% / 77.77%
||
7 Day CHG~0.00%
Published-27 Mar, 2024 | 16:50
Updated-30 Jul, 2025 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. Note: This vulnerability could be exploited over either IPv4 or IPv6 transport.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iosios_xeCisco IOS XE SoftwareIOSios_xeios
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2024-20351
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.58% / 67.83%
||
7 Day CHG~0.00%
Published-23 Oct, 2024 | 17:09
Updated-11 Aug, 2025 | 14:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software Snort Firewall Denial of Service Vulnerability

A vulnerability in the TCP/IP traffic handling function of the Snort Detection Engine of Cisco Firepower Threat Defense (FTD) Software and Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause legitimate network traffic to be dropped, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of TCP/IP network traffic. An attacker could exploit this vulnerability by sending a large amount of TCP/IP network traffic through the affected device. A successful exploit could allow the attacker to cause the Cisco FTD device to drop network traffic, resulting in a DoS condition. The affected device must be rebooted to resolve the DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defense_softwareCisco Firepower Threat Defense Softwarefirepower_threat_defense_software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2017-12233
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-10.01% / 92.76%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-1000_integrated_services_router1841_integrated_service_router1117-4pwe1100-4g\/6g_integrated_services_router1117-4plteeawe11201801_integrated_service_routercatalyst_ie3200_rugged_switch1100-4gltegb_integrated_services_routerioscatalyst_ie3400_rugged_switch1100-8p_integrated_services_router1100-6g_integrated_services_router1109-2p1111x-8p1101-4p1811_integrated_service_router1111-4pwe1941_integrated_services_router1113-8pmwe1101-4p_integrated_services_router1113-8pwe1921_integrated_services_router1802_integrated_service_routeresr-6300-ncp-k91100_integrated_services_router1100-4p_integrated_services_router1100-4pesr-6300-con-k91100-4g_integrated_services_router1116-4plteeawe1803_integrated_service_router1111-8pwb1109-4p1120_connected_grid_router1100-4gltena_integrated_services_router1160_integrated_services_router1120_integrated_services_router1906c_integrated_services_router1941w_integrated_services_routercatalyst_ie3300_rugged_switch1812_integrated_service_router1100-8pcatalyst_ie3400_heavy_duty_switch1861_integrated_service_router1101_integrated_services_router1131_integrated_services_router1117-4pmlteeawe1100-lte_integrated_services_routercatalyst_ie93001905_integrated_services_router1117-4pmwe1100_terminal_services_gateways1113-8plteeawe1116-4pweCisco IOSIOS software
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12231
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-10.85% / 93.09%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper translation of H.323 messages that use the Registration, Admission, and Status (RAS) protocol and are sent to an affected device via IPv4 packets. An attacker could exploit this vulnerability by sending a crafted H.323 RAS packet through an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to use an application layer gateway with NAT (NAT ALG) for H.323 RAS messages. By default, a NAT ALG is enabled for H.323 RAS messages. Cisco Bug IDs: CSCvc57217.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-catalyst_3850-nm-2-40gcatalyst_3850-24t-scatalyst_9800-80asr_901s-4sg-f-dasr_1009-xcatalyst_8300catalyst_3650-48fs-ecatalyst_3850-24xs-scatalyst_3650-24ts-lcatalyst_3850-12s-e1100_integrated_services_routercatalyst_3650-24ps-sasr_9910catalyst_3650-48fd-scatalyst_8300-2n2s-4t2xcatalyst_9800asr_920-12cz-dasr_920-12cz-a_rasr_920u-12sz-imcatalyst_3650-48fq-sasr_901-6cz-fs-acatalyst_3650-48fq-l1109-2p_integrated_services_routercatalyst_9300-48t-ecatalyst_3650-48pd-lcatalyst_9300-48t-acatalyst_9300l-48t-4g-a8201-32fh9800-lcatalyst_3650-48tq-ecatalyst_3650-48ps-lasr_1002_fixed_routercatalyst_9300-24s-acatalyst_3850-48xs-easr_1000-esp100catalyst_9300l-24t-4g-ecatalyst_82001841_integrated_service_routercatalyst_3650-12x48uzasr_901-4c-ft-dcatalyst_3850-48p-sasr_920-4sz-a_rasr_920-4sz-dcatalyst_3850-48f-ecatalyst_3650-24pdasr_901s-3sg-f-ahcatalyst_9300-24t-acatalyst_3650-48td-easr_1001-hxcatalyst_3850-24t-l8101-32hcatalyst_8500catalyst_9300-48uxm-ecatalyst_3650-48fd-lcatalyst_3850-48t-lcatalyst_3850-nm-8-10gcatalyst_9300l-24p-4g-acatalyst_9300-24u-aasr_900catalyst_3850-12x48ucatalyst_3650-24ps-e8201catalyst_3650-24pd-ecatalyst_3850-48t-ecatalyst_9800-cl1812_integrated_service_routerasr_901-12c-f-dcatalyst_8500lasr_907catalyst_3650-48td-lcatalyst_9200asr_1001-hx_rasr_1006-xcatalyst_3650-48td-scatalyst_9300-24s-ecatalyst_3650-8x24uq-lcatalyst_8300-1n1s-4t2xcatalyst_9300l-24t-4x-a1100-4g\/6g_integrated_services_router1801_integrated_service_router1100-4gltegb_integrated_services_routerasr_9010catalyst_3850-24xu-l1811_integrated_service_router8800_8-slotcatalyst_9300lcatalyst_9800-lasr_920-24sz-imcatalyst_3650-12x48ur-scatalyst_3650-24td-sasr_10138800_4-slotcatalyst_3650-48fq9800-clcatalyst_9300l-48p-4g-acatalyst_9300-24p-ecatalyst_9300-48un-acatalyst_96008808catalyst_95001160_integrated_services_router1941w_integrated_services_router1906c_integrated_services_routercatalyst_ie3300_rugged_switchasr_901s-2sg-f-dcatalyst_3650-12x48uq-sasr_920-24tz-m_rcatalyst_3850-24ucatalyst_3650-48pd-easr_920-12sz-im_rcatalyst_3850-16xs-scatalyst_3650-48tq-scatalyst_3850-48ucatalyst_9600xcatalyst_9300l-48t-4x-acatalyst_3650-24pdm-ecatalyst_3850-32xs-easr_9920asr_920-4sz-d_r4221_integrated_services_routercatalyst_3650-48ts-l1100-8p_integrated_services_router8212asr_920-24sz-mcatalyst_9300l-48t-4g-ecatalyst_9300l-48t-4x-ecatalyst_3650-12x48uq-lcatalyst_3850-48p-lasr_902asr_9006catalyst_3650-48pq-e1109-4p_integrated_services_routercatalyst_3850-24xu-ecatalyst_3850-24t-ecatalyst_8510csrcatalyst_9300lmasr_9000v8818catalyst_3650-12x48uz-sasr_901-6cz-f-acatalyst_3850-48u-lcatalyst_3850-24s-scatalyst_3850-24u-scatalyst_3650-24pd-scatalyst_3650-48fqm-ecatalyst_9300l-48p-4g-ecatalyst_3650catalyst_3850-12s-sasr_9902asr_901s-2sg-f-ahcatalyst_9300-24t-e9800-40catalyst_3650-12x48ur-ecatalyst_9300l-24p-4x-ecatalyst_9300-48u-acatalyst_9800-l-fcatalyst_3650-12x48ur-lcatalyst_ie3200_rugged_switchasr_1002-xcatalyst_8300-1n1s-6tcatalyst_3650-24pdm-lasr_10001100-6g_integrated_services_routercatalyst_3650-8x24uq-easr_901-6cz-ft-dcatalyst_3650-12x48uz-ecatalyst_9300l-48p-4x-acatalyst_8500-4qccatalyst_3850-24pw-scatalyst_3650-12x48fd-scatalyst_3850-48xs-s8218asr_920-10sz-pd_rcatalyst_9300-48u-ecatalyst_3850-48t-sasr_920-24sz-m_rcatalyst_3850-24xu-scatalyst_3850-48f-lcatalyst_3850catalyst_9600_supervisor_engine-18101-32fhasr_1002-hxcatalyst_3650-12x48uq8102-64hcatalyst_3650-8x24uq-sasr_920-12cz-acatalyst_3650-48pq-lcatalyst_3650-48fs-l1905_integrated_services_routercatalyst_9200lcatalyst_3650-24ps-lasr_9901catalyst_8540msrasr_901s-3sg-f-d8202catalyst_9300-48s-a8800_18-slotcatalyst_3850-32xs-sasr_1002-x_rcatalyst_3650-24td-ecatalyst_3850-48xs-f-e8800_12-slotcatalyst_3650-24td-lcatalyst_9300-24ux-e1111x-8p_integrated_services_routercatalyst_3850-24p-easr_9912catalyst_3650-12x48uz-lcatalyst_3850-24p-scatalyst_9300-24u-e1101-4p_integrated_services_routercatalyst_3650-48tq-lcatalyst_3850-24s-ecatalyst_3850-24xuasr_1023asr_903catalyst_3650-24pd-lcatalyst_9300l-24p-4g-ecatalyst_3850-24u-lasr_920-4sz-aasr_1000-esp200-x1100-4p_integrated_services_routercatalyst_3850-24u-easr_9904asr_901-6cz-fs-d1109_integrated_services_routerasr_901-4c-f-dcatalyst_3650-48fd-e8812catalyst_3650-48fs-scatalyst_3850-48pw-s1101_integrated_services_routerasr_901-6cz-ft-a8804catalyst_3850-12xs-scatalyst_3650-12x48urcatalyst_3850-24xsasr_920-12cz-d_rcatalyst_9300-24ux-acatalyst_8540csrcatalyst_3650-8x24uqcatalyst_3650-48ts-scatalyst_9200cxcatalyst_9300l-24t-4g-acatalyst_3650-8x24pd-scatalyst_8510msrcatalyst_9800_embedded_wireless_controlleriosasr_914catalyst_3850-48xscatalyst_3850-48p-ecatalyst_3850-48u-ecatalyst_9300l_stackcatalyst_3650-48fq-easr_902uasr_901-12c-ft-dcatalyst_3850-48xs-f-sasr_9922catalyst_3850-24p-lcatalyst_9300-48p-acatalyst_9300-48p-easr_1001-xcatalyst_9800-40_wireless_controllercatalyst_9300-48un-ecatalyst_3650-24ts-e1100-4g_integrated_services_routercatalyst_9800-40asr_9903catalyst_9300-24p-acatalyst_9300-48s-e1100-4gltena_integrated_services_router1120_integrated_services_routercatalyst_9300l-24t-4x-ecatalyst_9300xcatalyst_3850-24xs-ecatalyst_3850-48f-sasr_920-12sz-im1861_integrated_service_routercatalyst_3650-8x24pd-ecatalyst_9300-48uxm-a1100-lte_integrated_services_routercatalyst_9500hasr_1000-esp100-xasr_920-10sz-pdcatalyst_9300l-48p-4x-ecatalyst_3650-48fqm-scatalyst_3850-12xs-e1100_terminal_services_gatewaysasr_920-24tz-mcatalyst_3650-48fqm-lasr_920-24sz-im_rasr_1002-hx_rasr_1001catalyst_3650-48pq-scatalyst_3650-48fqmcatalyst_9300catalyst_3650-12x48fd-lasr_90001941_integrated_services_routercatalyst_3650-48pd-s1921_integrated_services_routercatalyst_3650-8x24pd-l1802_integrated_service_routerasr_9906catalyst_9300l-24p-4x-acatalyst_3650-12x48uq-e4000_integrated_services_routerasr_1001-x_r8208asr_1004catalyst_3650-48ps-easr_901-6cz-f-dcatalyst_9800-80_wireless_controllerasr_10061803_integrated_service_routercatalyst_3650-24ts-scatalyst_3650-24pdmcatalyst_3650-48ps-scatalyst_9800-l-casr_9001catalyst_3650-48ts-ecatalyst_3850-16xs-e9800-80catalyst_3850-48u-s1131_integrated_services_routercatalyst_3650-12x48fd-ecatalyst_3650-24pdm-scatalyst_8300-2n2s-6t111x_integrated_services_routerCisco IOSIOS software
CVE-2021-1313
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.60% / 68.37%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:56
Updated-08 Nov, 2024 | 23:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software Enf Broker Denial of Service Vulnerability

Multiple vulnerabilities in the ingress packet processing function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Software
CWE ID-CWE-399
Not Available
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2021-1230
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.70% / 71.08%
||
7 Day CHG~0.00%
Published-24 Feb, 2021 | 19:30
Updated-08 Nov, 2024 | 23:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Nexus 9000 Series Fabric Switches ACI Mode BGP Route Installation Denial of Service Vulnerability

A vulnerability with the Border Gateway Protocol (BGP) for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to cause a routing process to crash, which could lead to a denial of service (DoS) condition. This vulnerability is due to an issue with the installation of routes upon receipt of a BGP update. An attacker could exploit this vulnerability by sending a crafted BGP update to an affected device. A successful exploit could allow the attacker to cause the routing process to crash, which could cause the device to reload. This vulnerability applies to both Internal BGP (IBGP) and External BGP (EBGP). Note: The Cisco implementation of BGP accepts incoming BGP traffic from explicitly configured peers only. To exploit this vulnerability, an attacker would need to send a specific BGP update message over an established TCP connection that appears to come from a trusted BGP peer.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93180lc-exnexus_9332pqnexus_93108tc-exnx-osnexus_9372pxnexus_9364c-gxnexus_9508nexus_93108tc-fx-24nexus_92304qcnexus_93120txnexus_92160yc-xnexus_93128txnexus_9316d-gxnexus_9336pq_aci_spinenexus_93108tc-ex-24nexus_9372tx-enexus_93108tc-fxnexus_93360yc-fx2nexus_9396txnexus_93180yc-fx3snexus_9332cnexus_9364cnexus_92300ycnexus_92348gc-xnexus_9336c-fx2nexus_9348gc-fxpnexus_9272qnexus_93180yc-fx-24nexus_9336c-fx2-enexus_9396pxnexus_93216tc-fx2nexus_93240yc-fx2nexus_93180yc-fxnexus_9372txnexus_93180yc-exnexus_93600cd-gxnexus_9000vnexus_9372px-enexus_9236cnexus_93180yc-fx3nexus_93180yc-ex-24Cisco NX-OS System Software in ACI Mode
CWE ID-CWE-233
Improper Handling of Parameters
CVE-2021-1460
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.36%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:06
Updated-08 Nov, 2024 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOx Application Framework Denial of Service Vulnerability

A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iosic3000_industrial_compute_gatewaycgr1000_firmware829_industrial_integrated_services_routeric3000_industrial_compute_gateway_firmwarecgr1000809_industrial_integrated_services_routerCisco IOS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-1278
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.06% / 76.75%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 19:56
Updated-12 Nov, 2024 | 20:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN Denial of Service Vulnerabilities

Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-vedge_100b_routervedge_cloud_routersd-wan_vbond_orchestratorvedge_5000_routervedge_100_routersd-wan_firmwareios_xe_sd-wanvedge_2000_routersd-wan_vsmart_controller_firmwarevedge_100wm_routercatalyst_sd-wan_managervedge_1000_routervedge_100m_routerCisco SD-WAN Solution
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2023-44487
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-94.41% / 99.98%
||
7 Day CHG-0.06%
Published-10 Oct, 2023 | 00:00
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-10-31||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

Action-Not Available
Vendor-grpckonghqopenrestykazu-yamamotoistiolinecorptraefiknghttp2linkerdvarnish_cache_projectenvoyproxyakkadenacaddyserveramazonprojectcontourn/aJenkinsF5, Inc.The Netty ProjectEclipse Foundation AISBLThe IETF Administration LLC (IETF LLC)Apple Inc.NetApp, Inc.Microsoft CorporationRed Hat, Inc.Debian GNU/LinuxNode.js (OpenJS Foundation)The Apache Software FoundationFedora ProjectGoCisco Systems, Inc.Facebook
Product-nexus_9516openshift_serverlesscbl-marinernexus_34180ycnexus_3132c-zbig-ip_ddos_hybrid_defendernexus_3132q-xlproxygenarmerianexus_3132q-x\/3132q-xlunified_contact_center_enterprise_-_live_data_servernexus_9336pq_aci_spineintegration_service_registrynexus_9236c_switchwindows_11_22h2migration_toolkit_for_containersnexus_9396px.netnexus_31108pc-vnexus_9336c-fx2nexus_9396tx_switchopenshiftnginx_ingress_controllernexus_9236cadvanced_cluster_securitykong_gatewaynexus_93108tc-ex-24secure_web_appliancewindows_server_2016windows_server_2019openshift_container_platform_assisted_installerbig-ip_next_service_proxy_for_kubernetesnexus_3500integration_camel_knexus_9396txnexus_9372txnexus_93216tc-fx2apisixnginx_plusnexus_9800linkerdsupport_for_spring_bootnexus_3132q-xnode_healthcheck_operator3scale_api_management_platformnexus_9500nexus_93120txnexus_3264c-enexus_9500_4-slotopenstack_platformtelepresence_video_communication_servernexus_36180yc-rtomcatnexus_3132qnexus_3172tq-32topenshift_distributed_tracingnexus_9348gc-fxpbig-ip_nextenterprise_chat_and_emailbig-ip_global_traffic_managerbig-ip_fraud_protection_serviceunified_contact_center_enterprisecontouropenshift_container_platformnexus_3100-vsecure_malware_analyticsnexus_92160yc_switchnexus_34200yc-smnexus_9348d-gx2anexus_9364c-gxmigration_toolkit_for_virtualizationnexus_3100-zfog_directornexus_9804nexus_3432d-sultra_cloud_core_-_session_management_functionnexus_3524swiftnio_http\/2nexus_3400cryostatnexus_31108pv-vnexus_9372tx_switchnexus_3172tqbig-ip_advanced_web_application_firewalljboss_fusenexus_3172pq-xlfedoranexus_9272qopenshift_developer_tools_and_servicesnexus_9500rdecision_managernexus_9500_supervisor_b\+nexus_3548-x\/xlnexus_9232enexus_92348gc-xunified_attendant_console_advancedopenshift_sandboxed_containersultra_cloud_core_-_serving_gateway_functionnexus_9332d-h2rnexus_93128nexus_3548-xnexus_9200ycnexus_3064tbig-ip_policy_enforcement_managernexus_93108tc-exlogging_subsystem_for_red_hat_openshiftasp.net_corebig-ip_local_traffic_managernexus_93360yc-fx2big-ip_webacceleratornexus_3132q-vnexus_9336c-fx2-esolrcaddyistiounified_contact_center_management_portalnexus_9332cnexus_9200nexus_9516_switchnexus_3548nexus_3172pq\/pq-xlnexus_3048secure_dynamic_attributes_connectornexus_93600cd-gxnexus_9372px_switchnexus_3164qazure_kubernetes_serviceopenshift_secondary_scheduler_operatornexus_9500_8-slotnexus_9508openshift_virtualizationprime_cable_provisioningnexus_9364copensearch_data_preppernexus_93128tx_switchhttpwindows_10_21h2firepower_threat_defensesingle_sign-onnexus_9221cgobuild_of_optaplannerprime_access_registrarnetworkingnexus_9500_16-slotnexus_3232cnexus_93108tc-fxvarnish_cachenexus_9504jboss_enterprise_application_platformwindows_10_1607nexus_92304qcintegration_camel_for_spring_bootrun_once_duration_override_operatornexus_9716d-gxnexus_9000vnexus_3016windows_11_21h2openshift_pipelinesnexus_9408visual_studio_2022nexus_9336pq_acinexus_93180yc-fx3debian_linuxnx-osceph_storagenexus_9316d-gxnginxnexus_93180tc-exadvanced_cluster_management_for_kubernetesprime_network_registrarnexus_3408-straefiknexus_3064xnexus_9336pq_aci_spine_switchnexus_9372pxunified_contact_center_domain_managernettynexus_3264qnexus_3100vnexus_9372tx-e_switchnexus_93108tc-ex_switchtraffic_serverjboss_core_servicesnexus_9300jboss_a-mqjboss_a-mq_streamsnexus_3100nexus_93240tc-fx2machine_deletion_remediation_operatorbig-ip_application_security_managerbuild_of_quarkusnexus_93180yc-ex_switchnexus_9372tx-enode_maintenance_operatornexus_93180yc-ex-24nexus_3064openshift_dev_spacesnexus_9504_switchweb_terminalnexus_9736pqself_node_remediation_operatorcertification_for_red_hat_enterprise_linuxnexus_3172pqnexus_93128txiot_field_network_directornexus_3636c-rnexus_3064-tnexus_9372px-ehttp2nexus_92300yc_switchnexus_9364d-gx2aservice_interconnectnexus_93180yc-fxios_xeopenrestynexus_31128pqopenshift_service_meshbig-ip_analyticsopenshift_data_sciencebig-ip_application_acceleration_managernexus_9336pqnetwork_observability_operatorbig-ip_link_controllernexus_9372px-e_switchnexus_9332pq_switchnexus_9500_supervisor_bhttp_servernexus_93180yc-fx-24windows_10_22h2node.jsnexus_3600nexus_93180lc-exnexus_9636pqservice_telemetry_frameworkbig-ip_application_visibility_and_reportingmigration_toolkit_for_applicationsnexus_9808nexus_93108tc-fx-24nexus_92160yc-xnexus_31108tc-vnexus_3200nexus_9332d-gx2bcrosswork_situation_managernexus_3064-xnghttp2nexus_93180yc-fx3sbig-ip_websafenexus_3464cnexus_93180yc-exnexus_3172nexus_9536pqastra_control_centernexus_9396px_switchnexus_92300ycopenshift_api_for_data_protectionh2ojettynexus_9500_supervisor_anexus_9500_supervisor_a\+nexus_9272q_switchsatellitenexus_93180yc-fx3hprocess_automationdata_center_network_manageransible_automation_platformcost_managementsecure_web_appliance_firmwarejboss_data_gridnexus_9508_switchnexus_3064-32tcert-manager_operator_for_red_hat_openshiftoncommand_insightnexus_93240yc-fx2ios_xrnexus_93180lc-ex_switchfence_agents_remediation_operatorcrosswork_zero_touch_provisioningnexus_3232c_ultra_cloud_core_-_policy_control_functionbig-ip_carrier-grade_natnexus_3172tq-xlnexus_3524-xexpresswaygrpcbusiness_process_automationnexus_93108tc-fx3hnexus_92304qc_switchwindows_10_1809enterprise_linuxenvoyquaycrosswork_data_gatewaynexus_93108tc-fx3pbig-ip_domain_name_systemnexus_3548-xlnexus_93120tx_switchnexus_9432pqopenshift_gitopsnexus_3524-xlnexus_3232nexus_9332pqnexus_3524-x\/xlbig-ip_advanced_firewall_managerprime_infrastructurenexus_3016qjenkinsbig-ip_ssl_orchestratornexus_9348gc-fx3big-ip_access_policy_managerwindows_server_2022connected_mobile_experiencesn/ahttpHTTP/2
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2019-1968
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.44% / 62.11%
||
7 Day CHG~0.00%
Published-29 Aug, 2019 | 21:50
Updated-19 Nov, 2024 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco NX-OS Software NX-API Denial of Service Vulnerability

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP request to the NX-API on an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic. Note: The NX-API feature is disabled by default.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93180lc-exnexus_56128pnexus_9332pqnexus_3172tqnexus_93108tc-exnx-osnexus_3636c-rnexus_9508nexus_93120txnexus_93128txnexus_9336pq_aci_spinenexus_6004mds_9140nexus_3548-xlnexus_31128pqnexus_3132q-vnexus_9332cnexus_7000_9-slotnexus_9364cnexus_92348gc-xnexus_3172tq-32tnexus_9336c-fx2nexus_3164qmds_9200nexus_3524-xnexus_3132c-znexus_31108tc-vnexus_5548pnexus_9348gc-fxpnexus_5648qnexus_3172mds_9000nexus_9272qnexus_3464cmds_9700nexus_93216tc-fx2nexus_36180yc-rnexus_5672upnexus_93180yc-fxnexus_3264qnexus_3432d-snexus_34180ycnexus_9000vnexus_31108pc-vnexus_7700_18-slotnexus_5596upnexus_3524nexus_3548mds_9500nexus_7000_4-slotnexus_7700_6-slotnexus_3132qnexus_3016nexus_9372pxnexus_5696qnexus_92304qcnexus_92160yc-xnexus_7700_10-slotmds_9100nexus_9504nexus_3048nexus_9372tx-enexus_6001nexus_93108tc-fxnexus_93360yc-fx2nexus_3524-xlnexus_9396txnexus_7000_10-slotnexus_7000nexus_92300ycnexus_3064nexus_3232cnexus_5548upnexus_9396pxnexus_5596tnexus_3264c-enexus_7700_2-slotnexus_93240yc-fx2nexus_9372txnexus_5624qnexus_3548-xnexus_3132q-xlnexus_3064-tnexus_3172tq-xlnexus_93180yc-exnexus_3408-snexus_9372px-enexus_7000_18-slotnexus_9236cnexus_9516nexus_3172pq-xlnexus_7700Cisco NX-OS Software 6.0(2)A4(1)
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CVE-2019-1957
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.52% / 65.71%
||
7 Day CHG~0.00%
Published-08 Aug, 2019 | 07:30
Updated-19 Nov, 2024 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IoT Field Network Director TLS Renegotiation Denial of Service Vulnerability

A vulnerability in the web interface of Cisco IoT Field Network Director could allow an unauthenticated, remote attacker to trigger high CPU usage, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of Transport Layer Security (TLS) renegotiation requests. An attacker could exploit this vulnerability by sending renegotiation requests at a high rate. A successful exploit could increase the resource usage on the system, eventually leading to a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iot_field_network_directorCisco IoT Field Network Director (IoT-FND)
CWE ID-CWE-399
Not Available
CVE-2019-1900
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.27% / 50.01%
||
7 Day CHG~0.00%
Published-21 Aug, 2019 | 18:20
Updated-19 Nov, 2024 | 19:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Integrated Management Controller Unauthenticated Denial of Service Vulnerability

A vulnerability in the web server of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to cause the web server process to crash, causing a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient validation of user-supplied input on the web interface. An attacker could exploit this vulnerability by submitting a crafted HTTP request to certain endpoints of the affected software. A successful exploit could allow an attacker to cause the web server to crash. Physical access to the device may be required for a restart.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ucs_c125_m5ucs_s3260integrated_management_controller_supervisorucs_c4200unified_computing_systemCisco Unified Computing System (Management Software)
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2019-1967
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-2.57% / 84.96%
||
7 Day CHG~0.00%
Published-29 Aug, 2019 | 21:45
Updated-19 Nov, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco NX-OS Software Network Time Protocol Denial of Service Vulnerability

A vulnerability in the Network Time Protocol (NTP) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to excessive use of system resources when the affected device is logging a drop action for received MODE_PRIVATE (Mode 7) NTP packets. An attacker could exploit this vulnerability by flooding the device with a steady stream of Mode 7 NTP packets. A successful exploit could allow the attacker to cause high CPU and memory usage on the affected device, which could cause internal system processes to restart or cause the affected device to unexpectedly reload. Note: The NTP feature is enabled by default.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93180lc-exnexus_56128pnexus_9332pqnexus_3172tqnexus_93108tc-exnx-osnexus_3636c-rnexus_9508nexus_93120txnexus_93128txnexus_9336pq_aci_spinenexus_6004mds_9140nexus_3548-xlnexus_31128pqnexus_3132q-vnexus_9332cnexus_7000_9-slotnexus_9364cnexus_92348gc-xnexus_3172tq-32tnexus_9336c-fx2nexus_3164qmds_9200nexus_3524-xnexus_3132c-znexus_31108tc-vnexus_5548pnexus_9348gc-fxpnexus_5648qnexus_3172mds_9000nexus_9272qnexus_3464cmds_9700nexus_93216tc-fx2nexus_36180yc-rnexus_5672upnexus_93180yc-fxnexus_3264qnexus_3432d-snexus_34180ycnexus_9000vnexus_31108pc-vnexus_7700_18-slotnexus_5596upnexus_3524nexus_3548mds_9500nexus_7000_4-slotnexus_7700_6-slotnexus_3132qnexus_3016nexus_9372pxnexus_5696qnexus_92304qcnexus_92160yc-xnexus_7700_10-slotmds_9100nexus_9504nexus_3048nexus_9372tx-enexus_6001nexus_93108tc-fxnexus_93360yc-fx2nexus_3524-xlnexus_9396txnexus_7000_10-slotnexus_7000nexus_92300ycnexus_3064nexus_3232cnexus_5548upnexus_9396pxnexus_5596tnexus_3264c-enexus_7700_2-slotnexus_93240yc-fx2nexus_9372txnexus_5624qnexus_3548-xnexus_3132q-xlnexus_3064-tnexus_3172tq-xlnexus_93180yc-exnexus_3408-snexus_9372px-enexus_7000_18-slotnexus_9236cnexus_9516nexus_3172pq-xlnexus_7700Cisco NX-OS Software
CWE ID-CWE-399
Not Available
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2019-1741
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.11% / 77.27%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 23:25
Updated-19 Nov, 2024 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Encrypted Traffic Analytics Denial of Service Vulnerability

A vulnerability in the Cisco Encrypted Traffic Analytics (ETA) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a logic error that exists when handling a malformed incoming packet, leading to access to an internal data structure after it has been freed. An attacker could exploit this vulnerability by sending crafted, malformed IP packets to an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-416
Use After Free
CVE-2019-1766
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-3.19% / 86.47%
||
7 Day CHG~0.00%
Published-22 Mar, 2019 | 20:05
Updated-19 Nov, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IP Phone 8800 Series File Upload Denial of Service Vulnerability

A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software does not restrict the maximum size of certain files that can be written to disk. An attacker who has valid administrator credentials for an affected system could exploit this vulnerability by sending a crafted, remote connection request to an affected system. A successful exploit could allow the attacker to write a file that consumes most of the available disk space on the system, causing application functions to operate abnormally and leading to a DoS condition. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 12.5(1)SR1.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ip_phone_8800_firmwareip_phone_8800Cisco IP Phone 8800 Series Software
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1739
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-2.77% / 85.46%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 23:20
Updated-16 Sep, 2024 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS and IOS XE Software Network-Based Application Recognition Denial of Service Vulnerabilities

A vulnerability in the Network-Based Application Recognition (NBAR) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to a parsing issue on DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through routers that are running an affected version and have NBAR enabled. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeiosCisco IOS and Cisco IOS-XE Software
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1687
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.25% / 48.19%
||
7 Day CHG~0.00%
Published-03 May, 2019 | 15:00
Updated-21 Nov, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software TCP Proxy Denial of Service Vulnerability

A vulnerability in the TCP proxy functionality for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error in TCP-based packet inspection, which could cause the TCP packet to have an invalid Layer 2 (L2)-formatted header. An attacker could exploit this vulnerability by sending a crafted TCP packet sequence to the targeted device. A successful exploit could allow the attacker to cause a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asa_5550asa_5545-xasa_5505asa_5540adaptive_security_appliance_softwareasa_5555-xasa_5520asa_5510asa_5525-xasa_5580asa_5585-xasa_5512-xfirepower_threat_defenseasa_5515-xCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found