Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-20165

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-22 Jan, 2025 | 16:21
Updated At-18 Feb, 2025 | 19:39
Rejected At-
Credits

Cisco BroadWorks SIP Denial of Service Vulnerability

A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition. This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:22 Jan, 2025 | 16:21
Updated At:18 Feb, 2025 | 19:39
Rejected At:
▼CVE Numbering Authority (CNA)
Cisco BroadWorks SIP Denial of Service Vulnerability

A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition. This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco BroadWorks
Default Status
unknown
Versions
Affected
  • 22.0
  • 23.0
  • RI.2021.02
  • 23.0 ap380391
  • 23.0 ap380396
  • RI.2021.08
  • RI.2021.09
  • RI.2021.10
  • RI.2021.11
  • RI.2021.12
  • 23.0 ap382281
  • 22.0 ap382358
  • 23.0 ap382358
  • RI.2022.02
  • RI.2022.03
  • 23.0 ap373151
  • 23.0 ap371527
  • 22.0 ap353530
  • 22.0 ap348633
  • 22.0 ap347741
  • 22.0 ap352375
  • 22.0 ap353911
  • 22.0 ap339206
  • 22.0 ap351637
  • 22.0 ap351160
  • 22.0 ap339395
  • 23.0 ap372548
  • 23.0 ap373098
  • 22.0 ap358889
  • 22.0 ap359119
  • 22.0 ap357087
  • 22.0 ap357506
  • 22.0 ap361590
  • 22.0 ap356317
  • 22.0 ap358076
  • 22.0 ap355095
  • 22.0 ap352969
  • 22.0 ap356705
  • 23.0 ap375383
  • 23.0 ap375465
  • 23.0 ap375435
  • 22.0 ap375601
  • 22.0 ap375345
  • 22.0 ap349872
  • 22.0 ap381419
  • 23.0 ap380771
  • 22.0 ap367805
  • 22.0 ap365223
  • 22.0 ap368419
  • 22.0 ap360116
  • 22.0 ap366298
  • 22.0 ap368125
  • 22.0 ap364925
  • 22.0 ap368497
  • 22.0 ap364168
  • 22.0 ap367732
  • 23.0 ap380041
  • 22.0 ap382183
  • 22.0 ap382057
  • 23.0 ap381271
  • 23.0 ap381243
  • 23.0 ap380691
  • 23.0 ap375345
  • 23.0 ap375601
  • 22.0 ap377577
  • 23.0 ap379795
  • 23.0 ap382195
  • 23.0 ap376661
  • RI.2022.06
  • RI.2022.05
  • RI.2022.04
  • 23.0 ap376010
  • 23.0 ap382487
  • 23.0 ap383569
  • 23.0 ap383519
  • 23.0 ap383560
  • 22.0 ap383754
  • 23.0 ap383710
  • RI.2022.08
  • 22.0 ap366290
  • 22.0 ap372504
  • 22.0 ap366807
  • 22.0 ap373151
  • 22.0 ap366181
  • 22.0 ap366207
  • 22.0 ap371527
  • 23.0 ap367434
  • 22.0 ap365170
  • 22.0 ap372620
  • 22.0 ap354474
  • 22.0 ap372243
  • 22.0 ap366268
  • 22.0 ap366373
  • 22.0 ap379780
  • 23.0 ap351263
  • 22.0 ap364384
  • 22.0 ap365775
  • 22.0 ap361308
  • 22.0 ap351263
  • 22.0 ap364369
  • 22.0 ap364879
  • 22.0 ap365341
  • 22.0 ap360568
  • 22.0 ap366916
  • 22.0 ap363363
  • 22.0 ap363366
  • 22.0 ap374507
  • 22.0 ap374557
  • 22.0 ap375533
  • 22.0 ap373283
  • 22.0 ap372845
  • 22.0 ap373684
  • 22.0 ap373817
  • 22.0 ap367794
  • 22.0 ap369778
  • 22.0 ap368180
  • 22.0 ap369774
  • 22.0 ap366898
  • 22.0 ap366882
  • 22.0 ap359646
  • 22.0 ap353184
  • 22.0 ap358871
  • 22.0 ap348431
  • 22.0 ap358861
  • 22.0 ap348100
  • 22.0 ap359283
  • 22.0 ap356817
  • 22.0 ap356375
  • 22.0 ap373015
  • 22.0 ap374946
  • 22.0 ap374269
  • 22.0 ap373434
  • 22.0 ap373003
  • 22.0 ap372234
  • 22.0 ap365239
  • 22.0 ap369286
  • 22.0 ap367782
  • 22.0 ap359991
  • 22.0 ap359729
  • 22.0 ap358357
  • 22.0 ap360306
  • 22.0 ap359433
  • 22.0 ap359972
  • 22.0 ap365889
  • 22.0 ap369931
  • 22.0 ap353426
  • 22.0 ap360244
  • 22.0 ap360966
  • 22.0 ap367874
  • 22.0 ap376710
  • 22.0 ap377079
  • 22.0 ap356186
  • 23.0 ap377147
  • 22.0 ap380691
  • 22.0 ap361695
  • 23.0 ap383943
  • 23.0 ap383955
  • RI.2022.09
  • 23.0 ap383838
  • 23.0 ap384023
  • 23.0 ap384025
  • 23.0 ap383797
  • 22.0 ap383797
  • 23.0 ap384127
  • 23.0 ap384015
  • RI.2022.10
  • 22.0 ap384211
  • 23.0 ap384211
  • 23.0 ap383717
  • 23.0 ap384185
  • 23.0 ap384173
  • 23.0 ap383815
  • 23.0 ap384245
  • 22.0 ap383514
  • 22.0 ap360201
  • 22.0 ap353676
  • 23.0 ap377120
  • 22.0 ap374339
  • 22.0 ap355070
  • 22.0 ap374330
  • 22.0 ap375089
  • 23.0 ap368445
  • 23.0 ap372994
  • 23.0 ap369219
  • 23.0 ap369693
  • 22.0 ap369219
  • 23.0 ap381725
  • 22.0 ap370636
  • 23.0 ap376521
  • 22.0 ap371262
  • 22.0 ap382434
  • 22.0 ap355027
  • 23.0 ap379049
  • 22.0 ap361054
  • 22.0 ap369738
  • 23.0 ap375634
  • 22.0 ap369433
  • 22.0 ap377680
  • 22.0 ap357047
  • 22.0 ap377727
  • 22.0 ap377147
  • 22.0 ap377908
  • 23.0 ap367874
  • 22.0 ap366375
  • 22.0 ap379847
  • 22.0 ap358059
  • 23.0 ap373924
  • 23.0 ap383597
  • 22.0 ap365727
  • 22.0 ap374530
  • 22.0 ap360912
  • 23.0 ap373018
  • 22.0 ap378509
  • 23.0 ap376485
  • 22.0 ap371043
  • 22.0 ap378603
  • 22.0 ap372657
  • 22.0 ap363846
  • 22.0 ap376041
  • 22.0 ap372488
  • 22.0 ap359145
  • 23.0 ap368461
  • 22.0 ap378966
  • 23.0 ap376602
  • 22.0 ap356603
  • 23.0 ap373257
  • 23.0 ap376668
  • 22.0 ap381810
  • 23.0 ap375533
  • 22.0 ap364278
  • 23.0 ap380817
  • 23.0 ap374295
  • 22.0 ap381725
  • 23.0 ap380537
  • 22.0 ap377398
  • 22.0 ap370817
  • 22.0 ap374818
  • 23.0 ap380042
  • 23.0 ap374475
  • 22.0 ap373644
  • 22.0 ap366330
  • 22.0 ap361696
  • 23.0 ap377755
  • 22.0 ap373813
  • 22.0 ap375343
  • 22.0 ap379374
  • 23.0 ap374031
  • 22.0 ap377900
  • 22.0 ap360931
  • 22.0 ap362831
  • 22.0 ap367461
  • 22.0 ap354764
  • 22.0 ap352325
  • 23.0 ap372091
  • 23.0 ap370911
  • 22.0 ap363770
  • 22.0 ap379487
  • 23.0 ap380180
  • 23.0 ap367969
  • 23.0 ap380697
  • 22.0 ap363372
  • 22.0 ap353490
  • 23.0 ap373271
  • 22.0 ap356848
  • 22.0 ap373918
  • 22.0 ap382158
  • 22.0 ap364598
  • 23.0 ap381584
  • 23.0 ap379888
  • 22.0 ap356512
  • 22.0 ap379098
  • 22.0 ap376620
  • 23.0 ap367998
  • 23.0 ap366348
  • 22.0 ap376614
  • 23.0 ap382824
  • 23.0 ap376984
  • 23.0 ap366677
  • 23.0 ap381523
  • 22.0 ap383569
  • 22.0 ap382524
  • 22.0 ap379016
  • 22.0 ap363584
  • 22.0 ap358399
  • 22.0 ap383335
  • 23.0 ap374145
  • 22.0 ap374295
  • 23.0 ap376509
  • 22.0 ap354785
  • 23.0 ap381091
  • 23.0 ap380512
  • 22.0 ap355286
  • 22.0 ap368887
  • 22.0 ap383560
  • 23.0 ap382977
  • 23.0 ap368180
  • 22.0 ap352516
  • 22.0 ap350176
  • 23.0 ap366373
  • 23.0 ap375038
  • 23.0 ap373102
  • 23.0 ap378965
  • 23.0 ap378080
  • 22.0 ap377566
  • 22.0 ap359589
  • 23.0 ap380167
  • 22.0 ap372338
  • 22.0 ap361445
  • 22.0 ap354784
  • 22.0 ap356706
  • 22.0 ap378140
  • 23.0 ap378585
  • 22.0 ap356458
  • 22.0 ap368216
  • 22.0 ap367675
  • 22.0 ap368978
  • 23.0 ap374330
  • 22.0 ap355775
  • 23.0 ap372338
  • 22.0 ap380629
  • 23.0 ap376087
  • 22.0 ap367207
  • 22.0 ap366346
  • 22.0 ap376356
  • 22.0 ap375383
  • 22.0 ap373336
  • 23.0 ap378863
  • 22.0 ap352178
  • 23.0 ap363366
  • 22.0 ap351973
  • 22.0 ap366261
  • 22.0 ap354027
  • 23.0 ap368706
  • 22.0 ap364781
  • 23.0 ap362771
  • 23.0 ap360317
  • 22.0 ap380282
  • 22.0 ap356434
  • 23.0 ap380239
  • 22.0 ap365730
  • 23.0 ap381270
  • 22.0 ap355825
  • 22.0 ap361974
  • 22.0 ap371155
  • 22.0 ap377757
  • 22.0 ap361598
  • 22.0 ap383168
  • 23.0 ap377908
  • 22.0 ap370103
  • 22.0 ap381091
  • 23.0 ap382945
  • 23.0 ap377779
  • 22.0 ap346307
  • 23.0 ap365239
  • 22.0 ap371313
  • 23.0 ap371771
  • 23.0 ap373452
  • 23.0 ap375865
  • 22.0 ap374714
  • 22.0 ap376179
  • 22.0 ap362001
  • 22.0 ap378426
  • 23.0 ap369748
  • 23.0 ap383002
  • 22.0 ap371030
  • 22.0 ap370459
  • 23.0 ap372708
  • 22.0 ap382488
  • 22.0 ap368326
  • 23.0 ap370465
  • 22.0 ap355000
  • 22.0 ap355922
  • 23.0 ap369454
  • 22.0 ap364922
  • 22.0 ap365167
  • 22.0 ap374475
  • 23.0 ap367675
  • 22.0 ap379874
  • 22.0 ap366677
  • 22.0 ap366972
  • 22.0 ap372100
  • 23.0 ap373434
  • 22.0 ap356164
  • 23.0 ap372757
  • 22.0 ap376531
  • 23.0 ap377412
  • 22.0 ap365232
  • 22.0 ap348945
  • 22.0 ap352703
  • 22.0 ap364670
  • 23.0 ap370103
  • 23.0 ap370884
  • 23.0 ap366261
  • 22.0 ap367969
  • 23.0 ap378865
  • 22.0 ap371436
  • 22.0 ap375685
  • 23.0 ap380161
  • 22.0 ap366490
  • 23.0 ap380737
  • 23.0 ap370952
  • 22.0 ap374895
  • 22.0 ap366656
  • 22.0 ap379548
  • 23.0 ap378471
  • 23.0 ap379780
  • 22.0 ap378865
  • 22.0 ap354964
  • 22.0 ap371656
  • 22.0 ap381594
  • 23.0 ap381118
  • 22.0 ap368087
  • 22.0 ap363234
  • 22.0 ap362713
  • 23.0 ap372163
  • 23.0 ap379833
  • 22.0 ap377494
  • 23.0 ap367986
  • 22.0 ap362610
  • 22.0 ap378882
  • 23.0 ap370544
  • 22.0 ap379008
  • 22.0 ap382945
  • 22.0 ap362088
  • 22.0 ap383002
  • 23.0 ap370627
  • 22.0 ap362150
  • 22.0 ap371295
  • 22.0 ap350179
  • 22.0 ap371467
  • 23.0 ap369150
  • 22.0 ap365449
  • 23.0 ap375264
  • 23.0 ap379694
  • 22.0 ap381609
  • 22.0 ap353915
  • 22.0 ap358234
  • 22.0 ap363146
  • 22.0 ap369934
  • 23.0 ap366184
  • 22.0 ap371516
  • 22.0 ap365800
  • 22.0 ap356960
  • 22.0 ap343927
  • 22.0 ap361999
  • 22.0 ap373954
  • 23.0 ap379852
  • 22.0 ap375655
  • 23.0 ap382857
  • 22.0 ap380396
  • 22.0 ap381569
  • 22.0 ap369693
  • 22.0 ap358971
  • 23.0 ap366290
  • 22.0 ap378258
  • 22.0 ap380818
  • 22.0 ap359227
  • 22.0 ap358578
  • 23.0 ap371050
  • 23.0 ap383247
  • 22.0 ap354413
  • 22.0 ap382053
  • 23.0 ap367513
  • 22.0 ap374803
  • 23.0 ap383536
  • 22.0 ap360600
  • 22.0 ap373046
  • 23.0 ap372641
  • 22.0 ap379396
  • 22.0 ap377307
  • 23.0 ap379438
  • 23.0 ap379397
  • 22.0 ap365372
  • 22.0 ap364158
  • 23.0 ap380751
  • 22.0 ap361533
  • 22.0 ap371049
  • 22.0 ap352372
  • 23.0 ap378258
  • 23.0 ap383064
  • 22.0 ap362619
  • 23.0 ap379772
  • 22.0 ap379934
  • 23.0 ap365801
  • 23.0 ap366701
  • 22.0 ap381125
  • 22.0 ap357471
  • 22.0 ap362298
  • 22.0 ap353839
  • 22.0 ap383309
  • 23.0 ap375133
  • 22.0 ap353168
  • 23.0 ap369132
  • 23.0 ap371583
  • 22.0 ap373564
  • 23.0 ap366375
  • 22.0 ap363815
  • 23.0 ap365170
  • 22.0 ap365400
  • 22.0 ap371613
  • 22.0 ap373950
  • 23.0 ap352969
  • 23.0 ap379046
  • 22.0 ap380737
  • 22.0 ap359029
  • 23.0 ap367325
  • 22.0 ap359765
  • 23.0 ap378953
  • 22.0 ap357632
  • 22.0 ap361883
  • 23.0 ap379191
  • 22.0 ap364628
  • 22.0 ap369667
  • 22.0 ap352962
  • 22.0 ap349384
  • 22.0 ap367325
  • 22.0 ap368604
  • 22.0 ap370186
  • 23.0 ap371030
  • 23.0 ap376041
  • 23.0 ap380841
  • 22.0 ap372075
  • 22.0 ap370138
  • 22.0 ap371587
  • 23.0 ap366298
  • 22.0 ap380239
  • 23.0 ap377566
  • 22.0 ap380739
  • 23.0 ap371961
  • 22.0 ap367524
  • 22.0 ap376416
  • 22.0 ap378599
  • 22.0 ap381732
  • 22.0 ap354750
  • 22.0 ap375060
  • 23.0 ap383168
  • 22.0 ap351855
  • 22.0 ap382487
  • 22.0 ap370801
  • 23.0 ap379548
  • 22.0 ap361534
  • 22.0 ap352330
  • 22.0 ap369132
  • 22.0 ap375354
  • 22.0 ap363144
  • 22.0 ap361580
  • 23.0 ap381348
  • 22.0 ap383710
  • 22.0 ap378924
  • 23.0 ap363729
  • 22.0 ap363430
  • 22.0 ap375308
  • 23.0 ap376704
  • 23.0 ap374971
  • 22.0 ap368510
  • 23.0 ap364699
  • 23.0 ap374557
  • 23.0 ap372351
  • 22.0 ap364651
  • 22.0 ap373777
  • 22.0 ap370680
  • 22.0 ap380143
  • 23.0 ap367396
  • 22.0 ap364797
  • 23.0 ap372100
  • 23.0 ap367453
  • 22.0 ap373664
  • 22.0 ap373122
  • 22.0 ap370911
  • 22.0 ap354090
  • 23.0 ap382039
  • 22.0 ap372643
  • 23.0 ap381072
  • 22.0 ap358019
  • 23.0 ap381410
  • 22.0 ap378863
  • 22.0 ap364898
  • 22.0 ap353509
  • 23.0 ap378153
  • 23.0 ap383754
  • 23.0 ap382158
  • 22.0 ap374414
  • 23.0 ap380936
  • 22.0 ap377068
  • 22.0 ap366013
  • 22.0 ap357791
  • 22.0 ap380167
  • 22.0 ap379465
  • 22.0 ap382386
  • 22.0 ap369607
  • 23.0 ap372845
  • 22.0 ap373914
  • 23.0 ap380783
  • 22.0 ap378999
  • 23.0 ap382386
  • 23.0 ap369501
  • 22.0 ap364199
  • 22.0 ap370269
  • 23.0 ap377496
  • 23.0 ap368218
  • 22.0 ap380180
  • 22.0 ap372708
  • 23.0 ap379934
  • 23.0 ap376426
  • 22.0 ap360325
  • 22.0 ap363392
  • 23.0 ap377523
  • 22.0 ap380128
  • 22.0 ap355343
  • 22.0 ap381781
  • 22.0 ap368695
  • 23.0 ap378436
  • 22.0 ap365632
  • 23.0 ap382057
  • 22.0 ap379524
  • 23.0 ap372706
  • 22.0 ap357775
  • 23.0 ap364559
  • 22.0 ap371583
  • 23.0 ap376541
  • 22.0 ap366184
  • 22.0 ap363729
  • 23.0 ap356141
  • 22.0 ap358893
  • 22.0 ap356538
  • 22.0 ap356503
  • 22.0 ap360904
  • 22.0 ap374460
  • 22.0 ap371437
  • 23.0 ap370620
  • 22.0 ap371050
  • 22.0 ap366117
  • 23.0 ap366117
  • 22.0 ap375865
  • 23.0 ap367340
  • 23.0 ap378880
  • 22.0 ap376523
  • 22.0 ap380787
  • 22.0 ap375509
  • 22.0 ap350217
  • 22.0 ap380854
  • 23.0 ap376252
  • 22.0 ap354180
  • 22.0 ap342836
  • 23.0 ap370361
  • 22.0 ap363759
  • 23.0 ap374506
  • 23.0 ap377384
  • 23.0 ap365775
  • 23.0 ap373914
  • 23.0 ap382192
  • 23.0 ap383573
  • 23.0 ap380045
  • 22.0 ap366301
  • 22.0 ap370615
  • 22.0 ap355285
  • 22.0 ap380626
  • 23.0 ap380282
  • 22.0 ap359911
  • 22.0 ap377149
  • 23.0 ap356256
  • 22.0 ap358563
  • 22.0 ap370177
  • 23.0 ap363128
  • 23.0 ap371295
  • 22.0 ap355555
  • 23.0 ap381961
  • 22.0 ap370948
  • 22.0 ap359470
  • 23.0 ap373820
  • 23.0 ap368419
  • 22.0 ap371495
  • 23.0 ap380854
  • 23.0 ap378862
  • 22.0 ap356390
  • 22.0 ap363596
  • 22.0 ap378970
  • 23.0 ap378391
  • 23.0 ap375343
  • 23.0 ap369302
  • 23.0 ap368632
  • 22.0 ap366295
  • 23.0 ap379847
  • 23.0 ap374649
  • 22.0 ap353903
  • 22.0 ap371470
  • 22.0 ap357859
  • 22.0 ap374265
  • 22.0 ap374649
  • 22.0 ap350573
  • 22.0 ap383519
  • 22.0 ap380697
  • 22.0 ap357718
  • 22.0 ap367453
  • 22.0 ap376429
  • 22.0 ap355812
  • 22.0 ap355699
  • 23.0 ap349850
  • 22.0 ap362378
  • 22.0 ap370884
  • 22.0 ap368603
  • 22.0 ap370180
  • 22.0 ap355905
  • 23.0 ap368032
  • 22.0 ap356584
  • 23.0 ap364932
  • 22.0 ap360228
  • 23.0 ap378599
  • 22.0 ap355443
  • 23.0 ap370196
  • 23.0 ap379012
  • 23.0 ap367726
  • 22.0 ap368706
  • 22.0 ap381080
  • 23.0 ap373817
  • 23.0 ap377802
  • 22.0 ap373018
  • 22.0 ap376508
  • 22.0 ap356330
  • 22.0 ap381523
  • 22.0 ap357768
  • 23.0 ap375646
  • 22.0 ap383367
  • 22.0 ap351700
  • 22.0 ap358132
  • 22.0 ap374274
  • 23.0 ap369434
  • 22.0 ap380914
  • 22.0 ap380535
  • 22.0 ap355091
  • 22.0 ap358345
  • 23.0 ap368987
  • 22.0 ap358442
  • 22.0 ap362553
  • 22.0 ap372354
  • 23.0 ap366803
  • 23.0 ap379874
  • 22.0 ap355080
  • 22.0 ap357395
  • 23.0 ap367358
  • 22.0 ap375936
  • 22.0 ap372854
  • 22.0 ap365659
  • 22.0 ap352205
  • 23.0 ap376523
  • 22.0 ap359465
  • 23.0 ap374414
  • 22.0 ap383150
  • 22.0 ap366649
  • 22.0 ap369929
  • 23.0 ap372016
  • 22.0 ap376656
  • 23.0 ap366827
  • 22.0 ap370620
  • 23.0 ap373303
  • 23.0 ap375060
  • 22.0 ap353358
  • 22.0 ap360459
  • 23.0 ap382709
  • 23.0 ap374312
  • 23.0 ap366181
  • 22.0 ap369668
  • 22.0 ap375924
  • 23.0 ap369607
  • 22.0 ap374230
  • 22.0 ap378581
  • 22.0 ap380841
  • 23.0 ap375908
  • 22.0 ap353360
  • 22.0 ap362373
  • 23.0 ap381548
  • 22.0 ap364745
  • 22.0 ap359049
  • 23.0 ap367805
  • 22.0 ap367291
  • 22.0 ap365633
  • 23.0 ap383170
  • 22.0 ap383134
  • 23.0 ap374946
  • 23.0 ap377757
  • 22.0 ap353372
  • 23.0 ap379853
  • 23.0 ap370817
  • 22.0 ap352109
  • 23.0 ap371821
  • 22.0 ap378585
  • 22.0 ap371911
  • 22.0 ap372963
  • 22.0 ap365146
  • 23.0 ap378966
  • 23.0 ap375069
  • 22.0 ap373480
  • 22.0 ap364500
  • 22.0 ap361835
  • 23.0 ap367678
  • 22.0 ap354070
  • 22.0 ap366306
  • 22.0 ap353681
  • 22.0 ap370828
  • 22.0 ap354313
  • 22.0 ap364471
  • 22.0 ap379848
  • 22.0 ap374428
  • 22.0 ap368327
  • 22.0 ap382432
  • 22.0 ap360317
  • 23.0 ap368327
  • 22.0 ap356799
  • 22.0 ap380532
  • 22.0 ap377120
  • 22.0 ap360740
  • 22.0 ap370627
  • 22.0 ap381518
  • 22.0 ap382240
  • 22.0 ap374995
  • 23.0 ap376531
  • 22.0 ap370659
  • 23.0 ap365730
  • 22.0 ap380099
  • 23.0 ap381569
  • 22.0 ap379972
  • 23.0 ap375509
  • 23.0 ap366747
  • 22.0 ap352932
  • 23.0 ap372177
  • 22.0 ap365798
  • 22.0 ap382192
  • 22.0 ap359156
  • 23.0 ap379008
  • 23.0 ap369934
  • 22.0 ap358995
  • 23.0 ap382240
  • 23.0 ap379972
  • 22.0 ap359748
  • 22.0 ap364621
  • 23.0 ap380626
  • 22.0 ap378153
  • 23.0 ap373539
  • 22.0 ap370696
  • 23.0 ap370737
  • 23.0 ap378401
  • 22.0 ap376298
  • 22.0 ap367109
  • 23.0 ap382252
  • 23.0 ap379389
  • 22.0 ap357413
  • 22.0 ap372371
  • 22.0 ap374114
  • 22.0 ap345032
  • 22.0 ap355003
  • 22.0 ap382095
  • 22.0 ap365115
  • 23.0 ap373046
  • 23.0 ap367291
  • 22.0 ap379772
  • 23.0 ap382846
  • 22.0 ap365970
  • 22.0 ap363597
  • 22.0 ap376286
  • 22.0 ap362490
  • 22.0 ap367367
  • 22.0 ap372177
  • 23.0 ap372246
  • 22.0 ap372994
  • 23.0 ap369788
  • 22.0 ap377578
  • 23.0 ap378425
  • 22.0 ap371805
  • 22.0 ap362637
  • 22.0 ap368137
  • 23.0 ap369863
  • 22.0 ap372390
  • 22.0 ap380771
  • 22.0 ap368461
  • 23.0 ap378545
  • 23.0 ap378165
  • 22.0 ap379191
  • 22.0 ap364634
  • 22.0 ap355916
  • 22.0 ap370645
  • 23.0 ap377644
  • 22.0 ap377779
  • 23.0 ap369926
  • 23.0 ap381809
  • 22.0 ap380401
  • 23.0 ap375734
  • 22.0 ap376661
  • 22.0 ap382954
  • 22.0 ap381029
  • 23.0 ap361533
  • 22.0 ap380117
  • 22.0 ap378440
  • 23.0 ap376298
  • 23.0 ap364925
  • 23.0 ap376671
  • 22.0 ap374822
  • 22.0 ap366221
  • 22.0 ap370275
  • 23.0 ap374230
  • 23.0 ap380535
  • 22.0 ap373098
  • 23.0 ap373664
  • 23.0 ap368153
  • 22.0 ap354354
  • 23.0 ap372380
  • 23.0 ap366916
  • 22.0 ap381410
  • 23.0 ap382435
  • 22.0 ap380486
  • 22.0 ap361854
  • 22.0 ap352928
  • 22.0 ap382977
  • 23.0 ap367207
  • 23.0 ap367524
  • 22.0 ap370389
  • 23.0 ap368913
  • 22.0 ap363332
  • 23.0 ap374507
  • 22.0 ap380936
  • 23.0 ap369922
  • 22.0 ap367338
  • 22.0 ap377109
  • 22.0 ap350405
  • 23.0 ap376429
  • 23.0 ap365223
  • 22.0 ap365662
  • 22.0 ap354927
  • 23.0 ap373564
  • 22.0 ap377802
  • 22.0 ap360817
  • 22.0 ap364256
  • 23.0 ap371836
  • 22.0 ap355365
  • 22.0 ap368026
  • 22.0 ap372956
  • 22.0 ap381723
  • 23.0 ap373336
  • 22.0 ap370160
  • 23.0 ap377329
  • 22.0 ap372043
  • 23.0 ap366972
  • 22.0 ap358454
  • 23.0 ap380998
  • 22.0 ap376181
  • 22.0 ap376685
  • 23.0 ap374254
  • 23.0 ap368087
  • 22.0 ap375091
  • 22.0 ap368660
  • 23.0 ap366294
  • 22.0 ap352493
  • 22.0 ap380751
  • 22.0 ap358582
  • 23.0 ap378882
  • 23.0 ap375036
  • 22.0 ap363845
  • 22.0 ap378400
  • 22.0 ap362163
  • 22.0 ap366646
  • 22.0 ap352795
  • 22.0 ap361456
  • 23.0 ap378332
  • 22.0 ap356978
  • 22.0 ap367513
  • 22.0 ap365920
  • 23.0 ap371049
  • 23.0 ap374356
  • 22.0 ap372152
  • 22.0 ap378405
  • 22.0 ap369571
  • 22.0 ap373257
  • 23.0 ap366486
  • 23.0 ap374895
  • 23.0 ap382053
  • 23.0 ap376179
  • 23.0 ap366731
  • 22.0 ap374356
  • 23.0 ap372674
  • 22.0 ap357083
  • 22.0 ap365556
  • 22.0 ap358887
  • 23.0 ap371033
  • 22.0 ap372024
  • 22.0 ap381809
  • 22.0 ap352383
  • 22.0 ap368754
  • 23.0 ap382412
  • 22.0 ap365125
  • 22.0 ap375465
  • 23.0 ap372243
  • 22.0 ap371871
  • 23.0 ap345032
  • 23.0 ap377109
  • 22.0 ap360586
  • 22.0 ap352728
  • 22.0 ap357400
  • 22.0 ap373102
  • 22.0 ap376630
  • 22.0 ap371966
  • 22.0 ap354448
  • 22.0 ap375634
  • 23.0 ap376410
  • 23.0 ap366170
  • 22.0 ap377523
  • 22.0 ap368015
  • 22.0 ap359103
  • 23.0 ap376218
  • 23.0 ap375291
  • 23.0 ap374956
  • 23.0 ap366211
  • 22.0 ap376485
  • 22.0 ap380528
  • 23.0 ap372974
  • 23.0 ap369929
  • 23.0 ap369738
  • 23.0 ap374995
  • 22.0 ap357161
  • 22.0 ap362771
  • 22.0 ap372690
  • 22.0 ap375038
  • 23.0 ap368695
  • 22.0 ap359112
  • 23.0 ap359103
  • 22.0 ap379853
  • 23.0 ap375688
  • 22.0 ap365815
  • 23.0 ap378924
  • 22.0 ap348078
  • 22.0 ap371999
  • 23.0 ap373644
  • 22.0 ap354557
  • 22.0 ap366118
  • 22.0 ap367434
  • 22.0 ap352402
  • 23.0 ap375254
  • 23.0 ap368216
  • 22.0 ap372757
  • 22.0 ap380817
  • 23.0 ap363392
  • 22.0 ap376010
  • 22.0 ap373722
  • 22.0 ap368422
  • 23.0 ap366330
  • 23.0 ap354354
  • 23.0 ap351530
  • 23.0 ap378134
  • 23.0 ap381732
  • 23.0 ap383706
  • 22.0 ap381072
  • 22.0 ap356474
  • 23.0 ap374530
  • 22.0 ap375734
  • 22.0 ap361833
  • 22.0 ap363867
  • 22.0 ap358092
  • 22.0 ap374145
  • 22.0 ap362247
  • 22.0 ap374838
  • 22.0 ap373622
  • 22.0 ap375435
  • 22.0 ap353499
  • 23.0 ap376670
  • 23.0 ap371760
  • 23.0 ap376656
  • 22.0 ap371895
  • 23.0 ap369106
  • 23.0 ap370926
  • 22.0 ap382412
  • 23.0 ap381367
  • 22.0 ap382195
  • 22.0 ap373899
  • 22.0 ap353549
  • 22.0 ap377755
  • 22.0 ap360362
  • 23.0 ap380739
  • 22.0 ap356000
  • 22.0 ap370217
  • 23.0 ap381526
  • 23.0 ap379531
  • 22.0 ap370952
  • 23.0 ap378400
  • 22.0 ap369106
  • 22.0 ap378401
  • 22.0 ap369724
  • 22.0 ap367396
  • 23.0 ap376736
  • 22.0 ap377107
  • 22.0 ap358493
  • 22.0 ap363705
  • 23.0 ap375936
  • 22.0 ap352766
  • 22.0 ap355616
  • 22.0 ap361520
  • 22.0 ap356140
  • 23.0 ap374274
  • 22.0 ap358246
  • 22.0 ap360495
  • 22.0 ap362328
  • 22.0 ap364473
  • 22.0 ap370737
  • 22.0 ap381584
  • 22.0 ap362848
  • 23.0 ap367794
  • 23.0 ap372043
  • 22.0 ap354355
  • 22.0 ap370667
  • 22.0 ap353418
  • 23.0 ap380128
  • 23.0 ap368137
  • 22.0 ap371361
  • 23.0 ap379565
  • 22.0 ap367517
  • 23.0 ap365995
  • 23.0 ap383309
  • 22.0 ap382824
  • 22.0 ap380391
  • 23.0 ap372854
  • 23.0 ap369724
  • 23.0 ap365798
  • 22.0 ap365639
  • 22.0 ap357571
  • 22.0 ap370675
  • 23.0 ap370828
  • 22.0 ap359106
  • 22.0 ap356141
  • 23.0 ap369257
  • 23.0 ap366744
  • 23.0 ap367646
  • 22.0 ap353975
  • 23.0 ap380528
  • 23.0 ap363265
  • 23.0 ap381498
  • 22.0 ap370349
  • 22.0 ap363265
  • 22.0 ap352421
  • 22.0 ap372016
  • 23.0 ap381322
  • 22.0 ap375688
  • 22.0 ap369454
  • 23.0 ap370680
  • 22.0 ap362182
  • 22.0 ap365801
  • 23.0 ap378999
  • 23.0 ap375685
  • 22.0 ap353577
  • 22.0 ap359649
  • 22.0 ap352972
  • 22.0 ap373117
  • 22.0 ap381270
  • 22.0 ap355385
  • 22.0 ap375254
  • 22.0 ap352320
  • 22.0 ap372706
  • 23.0 ap375003
  • 23.0 ap373899
  • 23.0 ap379016
  • 23.0 ap382717
  • 22.0 ap357378
  • 22.0 ap349850
  • 22.0 ap353162
  • 22.0 ap360265
  • 22.0 ap363831
  • 22.0 ap359851
  • 22.0 ap357645
  • 23.0 ap377079
  • 23.0 ap382095
  • 22.0 ap379833
  • 23.0 ap379085
  • 23.0 ap376416
  • 23.0 ap372643
  • 22.0 ap359829
  • 22.0 ap361820
  • 22.0 ap372072
  • 22.0 ap370113
  • 22.0 ap355894
  • 22.0 ap378332
  • 22.0 ap355638
  • 22.0 ap379597
  • 22.0 ap382435
  • 23.0 ap373918
  • 22.0 ap378436
  • 22.0 ap366731
  • 22.0 ap353520
  • 23.0 ap377581
  • 22.0 ap383372
  • 22.0 ap353384
  • 23.0 ap378140
  • 22.0 ap372932
  • 23.0 ap374822
  • 22.0 ap381367
  • 22.0 ap380371
  • 23.0 ap374265
  • 23.0 ap375018
  • 22.0 ap361834
  • 23.0 ap378068
  • 22.0 ap377329
  • 22.0 ap383170
  • 23.0 ap373950
  • 22.0 ap364020
  • 22.0 ap363218
  • 23.0 ap365390
  • 22.0 ap376668
  • 22.0 ap363145
  • 23.0 ap374324
  • 23.0 ap382198
  • 23.0 ap366882
  • 22.0 ap370545
  • 23.0 ap382463
  • 23.0 ap370801
  • 23.0 ap368604
  • 23.0 ap378603
  • 23.0 ap373777
  • 22.0 ap359111
  • 23.0 ap382434
  • 23.0 ap371436
  • 22.0 ap378953
  • 22.0 ap357769
  • 22.0 ap359525
  • 22.0 ap372750
  • 23.0 ap364667
  • 22.0 ap366171
  • 22.0 ap377126
  • 22.0 ap364805
  • 22.0 ap380608
  • 22.0 ap373111
  • 22.0 ap379389
  • 23.0 ap371516
  • 23.0 ap378259
  • 23.0 ap369674
  • 23.0 ap374803
  • 22.0 ap355673
  • 22.0 ap377412
  • 22.0 ap375266
  • 22.0 ap374971
  • 22.0 ap376670
  • 22.0 ap362799
  • 23.0 ap372152
  • 22.0 ap374144
  • 22.0 ap358137
  • 22.0 ap383562
  • 22.0 ap379852
  • 22.0 ap365685
  • 22.0 ap369788
  • 23.0 ap375304
  • 22.0 ap374031
  • 23.0 ap364295
  • 23.0 ap378440
  • 22.0 ap353841
  • 22.0 ap365379
  • 23.0 ap368510
  • 22.0 ap375321
  • 22.0 ap376602
  • 22.0 ap380537
  • 22.0 ap358707
  • 23.0 ap369931
  • 22.0 ap361153
  • 22.0 ap365173
  • 22.0 ap364667
  • 22.0 ap370358
  • 22.0 ap354098
  • 22.0 ap372974
  • 23.0 ap365115
  • 22.0 ap362548
  • 22.0 ap376410
  • 23.0 ap366346
  • 22.0 ap355774
  • 23.0 ap383365
  • 23.0 ap382300
  • 23.0 ap374838
  • 22.0 ap354769
  • 23.0 ap383547
  • 22.0 ap361560
  • 23.0 ap373647
  • 23.0 ap369206
  • 22.0 ap354793
  • 22.0 ap374334
  • 23.0 ap371495
  • 22.0 ap371771
  • 22.0 ap362825
  • 22.0 ap376984
  • 23.0 ap372033
  • 22.0 ap356328
  • 22.0 ap379531
  • 22.0 ap374092
  • 23.0 ap365889
  • 22.0 ap354936
  • 22.0 ap355672
  • 22.0 ap361666
  • 23.0 ap380187
  • 22.0 ap348472
  • 22.0 ap370654
  • 23.0 ap373283
  • 23.0 ap380371
  • 22.0 ap375036
  • 22.0 ap379694
  • 23.0 ap360007
  • 22.0 ap377480
  • 23.0 ap369227
  • 22.0 ap379795
  • 23.0 ap371775
  • 23.0 ap373954
  • 23.0 ap371437
  • 23.0 ap382954
  • 22.0 ap343616
  • 23.0 ap381609
  • 22.0 ap378823
  • 22.0 ap355674
  • 22.0 ap365545
  • 23.0 ap366807
  • 22.0 ap375018
  • 23.0 ap374339
  • 22.0 ap381418
  • 23.0 ap378218
  • 23.0 ap379080
  • 22.0 ap375743
  • 22.0 ap369501
  • 22.0 ap356271
  • 22.0 ap366348
  • 22.0 ap370544
  • 22.0 ap380512
  • 23.0 ap379848
  • 22.0 ap365995
  • 22.0 ap361101
  • 23.0 ap381418
  • 22.0 ap378471
  • 22.0 ap371775
  • 22.0 ap356256
  • 22.0 ap380161
  • 23.0 ap352962
  • 22.0 ap364860
  • 22.0 ap382252
  • 23.0 ap374588
  • 23.0 ap372504
  • 23.0 ap377494
  • 22.0 ap365390
  • 23.0 ap366880
  • 22.0 ap357670
  • 22.0 ap359974
  • 23.0 ap367109
  • 22.0 ap365601
  • 22.0 ap359644
  • 22.0 ap356161
  • 23.0 ap379487
  • 22.0 ap364291
  • 22.0 ap371804
  • 23.0 ap376614
  • 23.0 ap374093
  • 22.0 ap376513
  • 23.0 ap371043
  • 23.0 ap375655
  • 23.0 ap381419
  • 22.0 ap377496
  • 22.0 ap381498
  • 23.0 ap367367
  • 22.0 ap367340
  • 22.0 ap353357
  • 22.0 ap379165
  • 22.0 ap376426
  • 22.0 ap378259
  • 22.0 ap364761
  • 22.0 ap378880
  • 22.0 ap370258
  • 22.0 ap359252
  • 22.0 ap376218
  • 22.0 ap364223
  • 22.0 ap351250
  • 22.0 ap383706
  • 23.0 ap380143
  • 23.0 ap366221
  • 22.0 ap371821
  • 22.0 ap373820
  • 22.0 ap354921
  • 23.0 ap377149
  • 22.0 ap360960
  • 22.0 ap380041
  • 22.0 ap365597
  • 22.0 ap376373
  • 23.0 ap375321
  • 23.0 ap377799
  • 23.0 ap375743
  • 22.0 ap382198
  • 22.0 ap375646
  • 23.0 ap377578
  • 22.0 ap353701
  • 22.0 ap376147
  • 23.0 ap379098
  • 22.0 ap382849
  • 23.0 ap373212
  • 23.0 ap370193
  • 23.0 ap380099
  • 23.0 ap366306
  • 22.0 ap381118
  • 23.0 ap383515
  • 23.0 ap376620
  • 22.0 ap354646
  • 22.0 ap352896
  • 22.0 ap358034
  • 23.0 ap373111
  • 23.0 ap370075
  • 23.0 ap379396
  • 22.0 ap363213
  • 22.0 ap352515
  • 22.0 ap365584
  • 22.0 ap363521
  • 23.0 ap373684
  • 22.0 ap380187
  • 22.0 ap369173
  • 23.0 ap372932
  • 22.0 ap364699
  • 22.0 ap371836
  • 22.0 ap373303
  • 23.0 ap378164
  • 23.0 ap364634
  • 22.0 ap366803
  • 23.0 ap366653
  • 23.0 ap377126
  • 22.0 ap355083
  • 22.0 ap378164
  • 23.0 ap376701
  • 22.0 ap372674
  • 23.0 ap372160
  • 23.0 ap366207
  • 22.0 ap366747
  • 23.0 ap374144
  • 23.0 ap366171
  • 22.0 ap374956
  • 22.0 ap376704
  • 22.0 ap381729
  • 22.0 ap359959
  • 22.0 ap373452
  • 23.0 ap371155
  • 23.0 ap375097
  • 23.0 ap375266
  • 22.0 ap359429
  • 23.0 ap381729
  • 22.0 ap361559
  • 22.0 ap353699
  • 23.0 ap373480
  • 22.0 ap364932
  • 22.0 ap360007
  • 22.0 ap371033
  • 22.0 ap367986
  • 23.0 ap373562
  • 22.0 ap378391
  • 22.0 ap379085
  • 22.0 ap374312
  • 23.0 ap382849
  • 22.0 ap362710
  • 23.0 ap377068
  • 23.0 ap371300
  • 22.0 ap376736
  • 22.0 ap362532
  • 22.0 ap365905
  • 22.0 ap362143
  • 22.0 ap354519
  • 22.0 ap370193
  • 22.0 ap382717
  • 23.0 ap378509
  • 23.0 ap367732
  • 23.0 ap378970
  • 22.0 ap381136
  • 22.0 ap370590
  • 23.0 ap373015
  • 23.0 ap379167
  • 22.0 ap373539
  • 23.0 ap368167
  • 22.0 ap359127
  • 22.0 ap371455
  • 22.0 ap372163
  • 22.0 ap375291
  • 22.0 ap354069
  • 22.0 ap377384
  • 22.0 ap365779
  • 22.0 ap378862
  • 22.0 ap381243
  • 22.0 ap380473
  • 22.0 ap369227
  • 22.0 ap368913
  • 22.0 ap372517
  • 22.0 ap375069
  • 22.0 ap366486
  • 22.0 ap376402
  • 23.0 ap381594
  • 23.0 ap376356
  • 23.0 ap382253
  • 22.0 ap365186
  • 23.0 ap371587
  • 22.0 ap373302
  • 22.0 ap376541
  • 23.0 ap380473
  • 23.0 ap376181
  • 22.0 ap371024
  • 22.0 ap374254
  • 23.0 ap380486
  • 23.0 ap372286
  • 23.0 ap371804
  • 22.0 ap366211
  • 22.0 ap373562
  • 22.0 ap369478
  • 22.0 ap377963
  • 22.0 ap358453
  • 22.0 ap379080
  • 22.0 ap352726
  • 22.0 ap360184
  • 22.0 ap361863
  • 23.0 ap377727
  • 22.0 ap370465
  • 22.0 ap353458
  • 22.0 ap369863
  • 22.0 ap356432
  • 23.0 ap366898
  • 23.0 ap366118
  • 22.0 ap370179
  • 22.0 ap370579
  • 22.0 ap364003
  • 22.0 ap375908
  • 23.0 ap374428
  • 22.0 ap366174
  • 22.0 ap382300
  • 22.0 ap377581
  • 23.0 ap372337
  • 22.0 ap373647
  • 22.0 ap376860
  • 22.0 ap372351
  • 23.0 ap377508
  • 23.0 ap367782
  • 22.0 ap369674
  • 22.0 ap370075
  • 23.0 ap378823
  • 22.0 ap366701
  • 22.0 ap355757
  • 22.0 ap358469
  • 22.0 ap366653
  • 22.0 ap370196
  • 23.0 ap369286
  • 23.0 ap376860
  • 22.0 ap368987
  • 22.0 ap369922
  • 23.0 ap367517
  • 22.0 ap357607
  • 23.0 ap375545
  • 23.0 ap366295
  • 22.0 ap358942
  • 23.0 ap370590
  • 22.0 ap376701
  • 22.0 ap358515
  • 22.0 ap378218
  • 23.0 ap363363
  • 23.0 ap382183
  • 22.0 ap375090
  • 23.0 ap362378
  • 22.0 ap366744
  • 23.0 ap376710
  • 22.0 ap351721
  • 23.0 ap370138
  • 22.0 ap372286
  • 22.0 ap374596
  • 23.0 ap372517
  • 22.0 ap378425
  • 23.0 ap378581
  • 23.0 ap372657
  • 22.0 ap354374
  • 22.0 ap369748
  • 22.0 ap371961
  • 23.0 ap384441
  • 23.0 ap383514
  • 23.0 ap384431
  • 23.0 ap384650
  • 23.0 ap384622
  • 23.0 ap384639
  • RI.2022.12
  • 23.0 ap384745
  • RI.2023.01
  • 23.0 ap384591
  • 23.0 ap384901
  • 23.0 ap384931
  • RI.2023.02
  • 23.0 ap384930
  • 23.0 ap384876
  • 23.0 ap385048
  • 23.0 ap385072
  • RI.2023.03
  • 23.0 ap385117
  • 23.0 ap385046
  • 23.0 ap385107
  • 23.0 ap385136
  • 23.0 ap385236
  • 23.0 ap385115
  • 23.0 ap385071
  • 23.0 ap385251
  • RI.2023.04
  • 23.0 ap385244
  • 23.0 ap385253
  • 23.0 ap384793
  • 23.0 ap385273
  • 23.0 ap385247
  • 23.0 ap385266
  • 23.0 ap384947
  • 23.0 ap385268
  • RI.2023.05
  • 23.0 ap385280
  • 23.0 ap385276
  • 23.0 ap385104
  • 23.0 ap385311
  • 23.0 ap385309
  • 21.sp1 ap352340
  • 21.sp1 ap358234
  • 21.sp1 ap352205
  • 21.sp1 ap353403
  • 21.sp1 ap347189
  • 21.sp1 ap339658
  • 21.0 ap348753
  • 21.sp1 ap348753
  • 21.0 ap349642
  • 21.sp1 ap344052
  • 21.0 ap363705
  • 21.sp1 ap364568
  • 21.sp1 ap361122
  • 21.sp1 ap364369
  • 21.sp1 ap352726
  • 21.0 ap345490
  • 21.sp1 ap349996
  • 21.sp1 ap349056
  • 21.sp1 ap356817
  • 21.sp1 ap367340
  • 21.sp1 ap357775
  • 21.sp1 ap342792
  • 21.sp1 ap345456
  • 21.sp1 ap355364
  • 21.sp1 ap363265
  • 21.sp1 ap366807
  • 21.0 ap240784
  • 21.sp1 ap351637
  • 21.0 ap351363
  • 21.sp1 ap341663
  • 21.0 ap343999
  • 21.sp1 ap349642
  • 21.sp1 ap244609
  • 21.sp1 ap345732
  • 21.sp1 ap361534
  • 21.0 ap366807
  • 21.0 ap356271
  • 21.sp1 ap358971
  • 21.sp1 ap370388
  • 21.0 ap354469
  • 21.sp1 ap346233
  • 21.sp1 ap346639
  • 21.0 ap350497
  • 21.0 ap245148
  • 21.sp1 ap344752
  • 21.sp1 ap375060
  • 21.0 ap341939
  • 21.sp1 ap243749
  • 21.sp1 ap351216
  • 21.0 ap347975
  • 21.sp1 ap349724
  • 21.sp1 ap360211
  • 21.0 ap354180
  • 21.sp1 ap343579
  • 21.sp1 ap245579
  • 21.sp1 ap215990
  • 21.0 ap355000
  • 21.sp1 ap360912
  • 21.sp1 ap351795
  • 21.sp1 ap357653
  • 21.0 ap345720
  • 21.0 ap348143
  • 21.sp1 ap347016
  • 21.0 ap235960
  • 21.sp1 ap366295
  • 21.sp1 ap369434
  • 21.sp1 ap354936
  • 21.sp1 ap353701
  • 21.0 ap338833
  • 21.0 ap339552
  • 21.sp1 ap339346
  • 21.0 ap356317
  • 21.sp1 ap363001
  • 21.sp1 ap361579
  • 21.0 ap361534
  • 21.0 ap354069
  • 21.0 ap346646
  • 21.0 ap349864
  • 21.sp1 ap349384
  • 21.0 ap363301
  • 21.0 ap355616
  • 21.sp1 ap339351
  • 21.sp1 ap343616
  • 21.0 ap348430
  • 21.0 ap344681
  • 21.0 ap352372
  • 21.sp1 ap349631
  • 21.sp1 ap350391
  • 21.sp1 ap342145
  • 21.0 ap355774
  • 21.sp1 ap350614
  • 21.sp1 ap342836
  • 21.sp1 ap354098
  • 21.sp1 ap355572
  • 21.sp1 ap346031
  • 21.0 ap350465
  • 21.sp1 ap353464
  • 21.sp1 ap351530
  • 21.0 ap350859
  • 21.0 ap244609
  • 21.sp1 ap346386
  • 21.sp1 ap372337
  • 21.0 ap350204
  • 21.sp1 ap352421
  • 21.sp1 ap338964
  • 21.sp1 ap361883
  • 21.0 ap351835
  • 21.0 ap349699
  • 21.0 ap339351
  • 21.0 ap339477
  • 21.sp1 ap342284
  • 21.sp1 ap356328
  • 21.0 ap342324
  • 21.0 ap351294
  • 21.0 ap364358
  • 21.sp1 ap342755
  • 21.0 ap355091
  • 21.sp1 ap360966
  • 21.0 ap345054
  • 21.sp1 ap353842
  • 21.sp1 ap356145
  • 21.0 ap347158
  • 21.sp1 ap346577
  • 21.sp1 ap350303
  • 21.0 ap338964
  • 21.0 ap350111
  • 21.sp1 ap364667
  • 21.0 ap341897
  • 21.sp1 ap343408
  • 21.0 ap361520
  • 21.sp1 ap365889
  • 21.sp1 ap358034
  • 21.sp1 ap351487
  • 21.sp1 ap356747
  • 21.sp1 ap351295
  • 21.0 ap366373
  • 21.0 ap355095
  • 21.0 ap359536
  • 21.sp1 ap348012
  • 21.sp1 ap354918
  • 21.sp1 ap348565
  • 21.sp1 ap242497
  • 21.sp1 ap354785
  • 21.0 ap348156
  • 21.sp1 ap339196
  • 21.0 ap357087
  • 21.sp1 ap344485
  • 21.sp1 ap242300
  • 21.sp1 ap349390
  • 21.0 ap351263
  • 21.sp1 ap356164
  • 21.sp1 ap363584
  • 21.sp1 ap373777
  • 21.0 ap358640
  • 21.sp1 ap359764
  • 21.sp1 ap357395
  • 21.sp1 ap342625
  • 21.sp1 ap351721
  • 21.0 ap339209
  • 21.0 ap353549
  • 21.0 ap347562
  • 21.sp1 ap362553
  • 21.sp1 ap355717
  • 21.sp1 ap364206
  • 21.sp1 ap364510
  • 21.0 ap347016
  • 21.0 ap363228
  • 21.sp1 ap345054
  • 21.0 ap352969
  • 21.sp1 ap365597
  • 21.0 ap345013
  • 21.sp1 ap359433
  • 21.sp1 ap347959
  • 21.sp1 ap374557
  • 21.sp1 ap366118
  • 21.sp1 ap346307
  • 21.0 ap341645
  • 21.0 ap351988
  • 21.sp1 ap346646
  • 21.sp1 ap379387
  • 21.0 ap356503
  • 21.sp1 ap351835
  • 21.sp1 ap367732
  • 21.sp1 ap344969
  • 21.0 ap344100
  • 21.sp1 ap349023
  • 21.sp1 ap235252
  • 21.0 ap366320
  • 21.sp1 ap346064
  • 21.sp1 ap369206
  • 21.0 ap359145
  • 21.0 ap351637
  • 21.0 ap354557
  • 21.0 ap347640
  • 21.sp1 ap356141
  • 21.sp1 ap345261
  • 21.sp1 ap348100
  • 21.sp1 ap344020
  • 21.sp1 ap352997
  • 21.0 ap338981
  • 21.sp1 ap346562
  • 21.0 ap345732
  • 21.sp1 ap343877
  • 21.sp1 ap347172
  • 21.sp1 ap368399
  • 21.0 ap361854
  • 21.sp1 ap350050
  • 21.0 ap342899
  • 21.sp1 ap345490
  • 21.0 ap350110
  • 21.sp1 ap341939
  • 21.0 ap354052
  • 21.0 ap351961
  • 21.sp1 ap349210
  • 21.sp1 ap348430
  • 21.sp1 ap360259
  • 21.sp1 ap342483
  • 21.sp1 ap347330
  • 21.sp1 ap346261
  • 21.sp1 ap352515
  • 21.sp1 ap342548
  • 21.0 ap350308
  • 21.0 ap346253
  • 21.sp1 ap356317
  • 21.sp1 ap358726
  • 21.0 ap342853
  • 21.0 ap346147
  • 21.sp1 ap372043
  • 21.sp1 ap364004
  • 21.0 ap242497
  • 21.sp1 ap359974
  • 21.sp1 ap356474
  • 21.sp1 ap355091
  • 21.sp1 ap350141
  • 21.sp1 ap354052
  • 21.0 ap354793
  • 21.0 ap342284
  • 21.0 ap355699
  • 21.sp1 ap350420
  • 21.sp1 ap355912
  • 21.sp1 ap365971
  • 21.sp1 ap351754
  • 21.0 ap338988
  • 21.0 ap347246
  • 21.sp1 ap348107
  • 21.sp1 ap362298
  • 21.sp1 ap366744
  • 21.0 ap348107
  • 21.sp1 ap345246
  • 21.0 ap367732
  • 21.0 ap215990
  • 21.0 ap339658
  • 21.0 ap357571
  • 21.0 ap344752
  • 21.sp1 ap350573
  • 21.sp1 ap371921
  • 21.sp1 ap373102
  • 21.sp1 ap345293
  • 21.sp1 ap347548
  • 21.sp1 ap359646
  • 21.0 ap349066
  • 21.sp1 ap362532
  • 21.sp1 ap346128
  • 21.sp1 ap359644
  • 21.0 ap343495
  • 21.sp1 ap361560
  • 21.0 ap349206
  • 21.0 ap343017
  • 21.sp1 ap347640
  • 21.0 ap247533
  • 21.sp1 ap358642
  • 21.0 ap363845
  • 21.sp1 ap369173
  • 21.sp1 ap344100
  • 21.0 ap359829
  • 21.sp1 ap358345
  • 21.sp1 ap365167
  • 21.0 ap339781
  • 21.sp1 ap352109
  • 21.sp1 ap375355
  • 21.sp1 ap375931
  • 21.0 ap339342
  • 21.sp1 ap349872
  • 21.sp1 ap359752
  • 21.0 ap350189
  • 21.sp1 ap365633
  • 21.0 ap365632
  • 21.sp1 ap355000
  • 21.0 ap344043
  • 21.sp1 ap362163
  • 21.0 ap356817
  • 21.0 ap355107
  • 21.sp1 ap345873
  • 21.0 ap347330
  • 21.sp1 ap375674
  • 21.sp1 ap374822
  • 21.0 ap349872
  • 21.sp1 ap366348
  • 21.sp1 ap356787
  • 21.sp1 ap351934
  • 21.sp1 ap375053
  • 21.0 ap348473
  • 21.sp1 ap245441
  • 21.sp1 ap353418
  • 21.0 ap342696
  • 21.sp1 ap363128
  • 21.sp1 ap373914
  • 21.sp1 ap364670
  • 21.0 ap354646
  • 21.0 ap359227
  • 21.sp1 ap339538
  • 21.sp1 ap343352
  • 21.0 ap348142
  • 21.sp1 ap350465
  • 21.sp1 ap351961
  • 21.sp1 ap369926
  • 21.sp1 ap344681
  • 21.0 ap350090
  • 21.0 ap356164
  • 21.0 ap346379
  • 21.0 ap352421
  • 21.0 ap360459
  • 21.0 ap357161
  • 21.sp1 ap374649
  • 21.0 ap342836
  • 21.0 ap346128
  • 21.sp1 ap365798
  • 21.0 ap348367
  • 21.sp1 ap357574
  • 21.sp1 ap358399
  • 21.0 ap358411
  • 21.sp1 ap363560
  • 21.sp1 ap356424
  • 21.sp1 ap345850
  • 21.0 ap359030
  • 21.sp1 ap363695
  • 21.sp1 ap342060
  • 21.sp1 ap350164
  • 21.sp1 ap345729
  • 21.sp1 ap350179
  • 21.sp1 ap351263
  • 21.0 ap346307
  • 21.0 ap358942
  • 21.sp1 ap348034
  • 21.0 ap342175
  • 21.sp1 ap354413
  • 21.0 ap352515
  • 21.sp1 ap358132
  • 21.sp1 ap350474
  • 21.sp1 ap350884
  • 21.sp1 ap379440
  • 21.sp1 ap363846
  • 21.sp1 ap348531
  • 21.sp1 ap371804
  • 21.0 ap347189
  • 21.sp1 ap359112
  • 21.0 ap356584
  • 21.0 ap358582
  • 21.0 ap342588
  • 21.0 ap346900
  • 21.sp1 ap346900
  • 21.sp1 ap351701
  • 21.0 ap356145
  • 21.sp1 ap350204
  • 21.0 ap361876
  • 21.sp1 ap352372
  • 21.sp1 ap361055
  • 21.sp1 ap349011
  • 21.0 ap365889
  • 21.sp1 ap366747
  • 21.sp1 ap345477
  • 21.sp1 ap350456
  • 21.0 ap359085
  • 21.0 ap350143
  • 21.sp1 ap362593
  • 21.0 ap349617
  • 21.0 ap356231
  • 21.sp1 ap366486
  • 21.sp1 ap366320
  • 21.sp1 ap339395
  • 21.0 ap365167
  • 21.0 ap344270
  • 21.0 ap350591
  • 21.0 ap360966
  • 21.sp1 ap364473
  • 21.0 ap346639
  • 21.sp1 ap339568
  • 21.sp1 ap342461
  • 21.sp1 ap364384
  • 21.0 ap365170
  • 21.0 ap346554
  • 21.0 ap358889
  • 21.0 ap354098
  • 21.sp1 ap367461
  • 21.0 ap353839
  • 21.sp1 ap339376
  • 21.0 ap346074
  • 21.sp1 ap343495
  • 21.0 ap361883
  • 21.sp1 ap366268
  • 21.sp1 ap354050
  • 21.sp1 ap363597
  • 21.sp1 ap347562
  • 21.sp1 ap351495
  • 21.sp1 ap242893
  • 21.sp1 ap349863
  • 21.0 ap346559
  • 21.0 ap340168
  • 21.sp1 ap342975
  • 21.sp1 ap355107
  • 21.sp1 ap351014
  • 21.0 ap347741
  • 21.sp1 ap357571
  • 21.sp1 ap363146
  • 21.sp1 ap341577
  • 21.sp1 ap347741
  • 21.sp1 ap352766
  • 21.sp1 ap350763
  • 21.sp1 ap339781
  • 21.0 ap355003
  • 21.0 ap338965
  • 21.sp1 ap373814
  • 21.sp1 ap353549
  • 21.sp1 ap354707
  • 21.0 ap346347
  • 21.0 ap243749
  • 21.sp1 ap346347
  • 21.0 ap345246
  • 21.sp1 ap361420
  • 21.sp1 ap355699
  • 21.sp1 ap348952
  • 21.0 ap349867
  • 21.0 ap345069
  • 21.sp1 ap364158
  • 21.sp1 ap351248
  • 21.sp1 ap347534
  • 21.sp1 ap346724
  • 21.sp1 ap354474
  • 21.sp1 ap373349
  • 21.sp1 ap361308
  • 21.sp1 ap348431
  • 21.0 ap348633
  • 21.sp1 ap344043
  • 21.0 ap354413
  • 21.sp1 ap363705
  • 21.sp1 ap342696
  • 21.0 ap360306
  • 21.sp1 ap346862
  • 21.sp1 ap351894
  • 21.0 ap345452
  • 21.0 ap352766
  • 21.sp1 ap350832
  • 21.sp1 ap349206
  • 21.sp1 ap356375
  • 21.sp1 ap361641
  • 21.sp1 ap367325
  • 21.sp1 ap342217
  • 21.sp1 ap359956
  • 21.0 ap349724
  • 21.sp1 ap346074
  • 21.sp1 ap342853
  • 21.0 ap351478
  • 21.sp1 ap361863
  • 21.sp1 ap350613
  • 21.sp1 ap342220
  • 21.sp1 ap370620
  • 21.sp1 ap338833
  • 21.sp1 ap244265
  • 21.sp1
  • 21.sp1 ap339206
  • 21.sp1 ap344954
  • 21.0 ap354707
  • 21.sp1 ap359076
  • 21.0 ap346376
  • 21.sp1 ap348104
  • 21.0 ap360600
  • 21.0 ap245468
  • 21.sp1 ap361412
  • 21.0 ap352972
  • 21.0 ap342946
  • 21.sp1 ap367782
  • 21.sp1 ap233247
  • 21.sp1 ap345627
  • 21.sp1 ap245148
  • 21.sp1 ap358942
  • 21.sp1 ap355385
  • 21.sp1 ap342899
  • 21.sp1 ap354646
  • 21.sp1 ap364358
  • 21.sp1 ap351294
  • 21.0 ap364510
  • 21.0 ap352320
  • 21.sp1 ap343351
  • 21.sp1 ap351988
  • 21.sp1 ap339209
  • 21.sp1 ap361520
  • 21.sp1 ap246656
  • 21.sp1 ap365632
  • 21.0 ap345261
  • 21.sp1 ap339236
  • 21.sp1 ap360325
  • 21.0 ap348945
  • 21.sp1 ap355875
  • 21.sp1 ap360306
  • 21.0 ap353841
  • 21.0 ap339395
  • 21.0 ap357607
  • 21.0 ap235252
  • 21.sp1 ap345633
  • 21.sp1 ap363228
  • 21.0 ap354936
  • 21.sp1 ap338972
  • 21.sp1 ap341471
  • 21.sp1 ap361153
  • 21.sp1 ap351363
  • 21.0 ap359470
  • 21.sp1 ap359589
  • 21.0 ap353418
  • 21.0 ap343352
  • 21.sp1 ap348037
  • 21.sp1 ap339552
  • 21.sp1 ap348633
  • 21.0 ap348093
  • 21.sp1 ap354069
  • 21.sp1 ap347905
  • 21.sp1 ap347302
  • 21.0 ap348078
  • 21.sp1 ap374265
  • 21.sp1 ap348740
  • 21.0 ap349859
  • 21.sp1 ap346559
  • 21.sp1 ap342175
  • 21.sp1 ap360771
  • 21.sp1 ap379554
  • 21.0 ap356458
  • 21.sp1 ap342127
  • 21.0 ap343877
  • 21.0 ap356328
  • 21.sp1 ap344479
  • 21.sp1 ap370196
  • 21.0 ap341471
  • 21.sp1 ap338988
  • 21.0 ap338972
  • 21.sp1 ap340054
  • 21.0 ap346622
  • 21.sp1 ap365449
  • 21.sp1 ap353354
  • 21.0 ap351721
  • 21.sp1 ap359911
  • 21.sp1 ap359023
  • 21.0 ap344253
  • 21.sp1 ap346622
  • 21.sp1 ap365556
  • 21.sp1 ap372454
  • 21.sp1 ap349589
  • 21.sp1 ap357197
  • 21.sp1 ap360459
  • 21.sp1 ap359085
  • 21.0 ap343410
  • 21.sp1 ap349859
  • 21.sp1 ap338879
  • 21.sp1 ap342474
  • 21.sp1 ap345548
  • 21.0 ap357653
  • 21.sp1 ap344094
  • 21.0 ap351700
  • 21.sp1 ap358563
  • 21.0 ap350613
  • 21.0 ap364473
  • 21.sp1 ap362825
  • 21.sp1 ap361854
  • 21.sp1 ap341645
  • 21.0 ap342771
  • 21.0 ap347302
  • 21.sp1 ap348462
  • 21.sp1 ap355894
  • 21.0 ap346183
  • 21.0 ap341350
  • 21.sp1 ap346376
  • 21.0 ap343408
  • 21.sp1 ap349221
  • 21.sp1 ap378970
  • 21.0 ap349996
  • 21.sp1 ap354789
  • 21.sp1 ap355581
  • 21.sp1 ap341908
  • 21.sp1 ap359685
  • 21.0 ap345627
  • 21.0 ap363584
  • 21.sp1 ap359145
  • 21.0 ap363560
  • 21.sp1 ap359227
  • 21.sp1 ap359030
  • 21.sp1 ap371527
  • 21.0 ap339376
  • 21.sp1 ap354469
  • 21.0 ap345633
  • 21.0 ap243808
  • 21.0 ap244020
  • 21.sp1 ap350338
  • 21.0 ap348472
  • 21.sp1 ap354927
  • 21.sp1 ap338981
  • 21.0 ap344969
  • 21.sp1 ap366803
  • 21.0 ap344052
  • 21.sp1 ap339897
  • 21.sp1 ap361945
  • 21.sp1 ap345738
  • 21.0 ap359729
  • 21.0 ap348034
  • 21.sp1 ap359465
  • 21.0 ap359076
  • 21.sp1 ap347930
  • 21.0 ap347896
  • 21.sp1 ap348367
  • 21.0 ap246656
  • 21.sp1 ap362317
  • 21.0 ap339538
  • 21.sp1 ap345452
  • 21.0 ap348012
  • 21.sp1 ap375061
  • 21.sp1 ap363363
  • 21.sp1 ap354494
  • 21.sp1 ap364003
  • 21.sp1 ap360586
  • 21.0 ap358893
  • 21.sp1 ap339342
  • 21.0 ap350491
  • 21.sp1 ap357718
  • 21.sp1 ap354964
  • 21.0 ap244595
  • 21.sp1 ap244595
  • 21.sp1 ap364879
  • 21.sp1 ap373813
  • 21.sp1 ap358095
  • 21.sp1 ap359959
  • 21.sp1 ap355855
  • 21.sp1 ap356458
  • 21.0 ap342217
  • 21.0 ap363146
  • 21.sp1 ap347685
  • 21.sp1 ap347603
  • 21.0 ap355673
  • 21.sp1 ap346379
  • 21.sp1 ap360931
  • 21.0 ap342625
  • 21.sp1 ap344253
  • 21.0 ap343351
  • 21.sp1 ap351644
  • 21.sp1 ap357768
  • 21.sp1 ap360600
  • 21.sp1 ap349617
  • 21.sp1 ap370801
  • 21.sp1 ap350111
  • 21.0 ap351644
  • 21.0 ap354494
  • 21.sp1 ap348156
  • 21.sp1 ap357161
  • 21.0 ap344020
  • 21.0 ap339196
  • 21.sp1 ap354331
  • 21.sp1 ap361820
  • 21.sp1 ap348945
  • 21.0 ap342220
  • 21.sp1 ap341897
  • 21.sp1 ap350143
  • 21.sp1 ap249376
  • 21.0 ap245579
  • 21.sp1 ap343017
  • 21.0 ap354964
  • 21.0 ap244265
  • 21.0 ap349056
  • 21.sp1 ap348878
  • 21.sp1 ap375026
  • 21.0 ap344094
  • 21.sp1 ap357083
  • 21.sp1 ap349443
  • 21.sp1 ap364256
  • 21.sp1 ap358469
  • 21.sp1 ap375465
  • 21.0 ap353842
  • 21.0 ap348100
  • 21.0 ap354474
  • 21.0 ap342975
  • 21.0 ap345755
  • 21.0 ap350884
  • 21.0 ap355385
  • 21.0 ap358469
  • 21.sp1 ap358101
  • 21.sp1 ap352972
  • 21.sp1 ap357047
  • 21.sp1 ap364062
  • 21.sp1 ap359729
  • 21.sp1 ap350189
  • 21.sp1 ap348143
  • 21.0 ap340054
  • 21.sp1 ap366370
  • 21.0 ap356474
  • 21.0 ap364384
  • 21.0 ap350141
  • 21.sp1 ap357607
  • 21.sp1 ap349864
  • 21.sp1 ap353843
  • 21.sp1 ap342543
  • 21.0 ap338879
  • 21.0 ap242300
  • 21.sp1 ap357769
  • 21.sp1 ap366211
  • 21.sp1 ap245468
  • 21.sp1 ap345059
  • 21.0 ap358563
  • 21.0 ap339200
  • 21.sp1 ap372842
  • 21.sp1 ap359119
  • 21.sp1 ap343675
  • 21.sp1 ap354531
  • 21.sp1 ap366373
  • 21.sp1 ap363301
  • 21.sp1 ap352087
  • 21.sp1 ap240784
  • 21.sp1 ap349867
  • 21.sp1 ap344952
  • 21.sp1 ap339200
  • 21.0 ap349210
  • 21.0 ap351216
  • 21.sp1 ap344422
  • 21.sp1 ap343999
  • 21.0 ap364471
  • 21.sp1 ap371030
  • 21.sp1 ap367524
  • 21.sp1 ap344945
  • 21.sp1 ap360993
  • 21.sp1 ap365186
  • 21.0 ap346076
  • 21.sp1 ap374145
  • 21.sp1 ap358641
  • 21.0 ap356787
  • 21.sp1 ap348564
  • 21.sp1 ap361590
  • 21.sp1 ap356231
  • 21.0 ap346386
  • 21.sp1 ap355673
  • 21.0 ap358234
  • 21.0 ap350478
  • 21.sp1 ap373015
  • 21.sp1 ap347246
  • 21.sp1 ap342782
  • 21.0 ap364369
  • 21.sp1 ap362637
  • 21.sp1 ap349383
  • 21.0 ap358345
  • 21.sp1 ap349066
  • 21.0 ap342145
  • 21.0 ap343445
  • 21.0 ap358101
  • 21.sp1 ap345720
  • 21.sp1 ap352795
  • 21.sp1 ap350591
  • 21.0 ap359589
  • 21.0 ap346902
  • 21.sp1 ap363218
  • 21.sp1 ap355638
  • 21.0 ap249383
  • 21.sp1 ap353499
  • 21.sp1 ap350859
  • 21.0 ap352728
  • 21.sp1 ap349699
  • 21.0 ap354785
  • 21.sp1 ap365390
  • 21.sp1 ap361821
  • 21.0 ap339568
  • 21.sp1 ap343445
  • 21.sp1 ap340730
  • 21.sp1 ap348527
  • 21.sp1 ap342588
  • 21.sp1 ap351704
  • 21.0 ap351701
  • 21.sp1 ap342771
  • 21.sp1 ap370636
  • 21.sp1 ap367794
  • 21.sp1 ap365730
  • 21.0
  • 21.sp1 ap375036
  • 21.sp1 ap379847
  • 21.sp1 ap359470
  • 21.0 ap359646
  • 21.sp1 ap365584
  • 21.sp1 ap355095
  • 21.sp1 ap346632
  • 21.0 ap354331
  • 21.0 ap361590
  • 21.0 ap352795
  • 21.0 ap366118
  • 21.sp1 ap348142
  • 21.sp1 ap348078
  • 21.sp1 ap354793
  • 21.0 ap344952
  • 21.0 ap344945
  • 21.0 ap356978
  • 21.sp1 ap349703
  • 21.sp1 ap366731
  • 21.sp1 ap358861
  • 21.sp1 ap365662
  • 21.sp1 ap353841
  • 21.sp1 ap344964
  • 21.0 ap366290
  • 21.sp1 ap358137
  • 21.sp1 ap346607
  • 21.sp1 ap341498
  • 21.sp1 ap347158
  • 21.sp1 ap373786
  • 21.sp1 ap346902
  • 21.sp1 ap365170
  • 21.sp1 ap366880
  • 21.sp1 ap363729
  • 21.0 ap351160
  • 21.sp1 ap244020
  • 21.sp1 ap380473
  • 21.0 ap352896
  • 21.0 ap346562
  • 21.sp1 ap348093
  • 21.sp1 ap352320
  • 21.0 ap366295
  • 21.sp1 ap344238
  • 21.0 ap364670
  • 21.0 ap350338
  • 21.sp1 ap360893
  • 21.sp1 ap338965
  • 21.sp1 ap353839
  • 21.0 ap346085
  • 21.sp1 ap355003
  • 21.0 ap345850
  • 21.0 ap340730
  • 21.0 ap341908
  • 21.sp1 ap358731
  • 21.0 ap346607
  • 21.0 ap350614
  • 21.sp1 ap360907
  • 21.sp1 ap356978
  • 21.0 ap351898
  • 21.0 ap242893
  • 21.0 ap339346
  • 21.sp1 ap358893
  • 21.0 ap355904
  • 21.sp1 ap366298
  • 21.sp1 ap357049
  • 21.sp1 ap365970
  • 21.0 ap342792
  • 21.sp1 ap349850
  • 21.sp1 ap346554
  • 21.sp1 ap340168
  • 21.sp1 ap358019
  • 21.0 ap347172
  • 21.0 ap353701
  • 21.sp1 ap342028
  • 21.sp1 ap373899
  • 21.0 ap359752
  • 21.sp1 ap346337
  • 21.sp1 ap367998
  • 21.sp1 ap359829
  • 21.0 ap345293
  • 21.sp1 ap361559
  • 21.sp1 ap368497
  • 21.sp1 ap345069
  • 21.sp1 ap342324
  • 21.sp1 ap362961
  • 21.sp1 ap348086
  • 21.sp1 ap351700
  • 21.sp1 ap373950
  • 21.sp1 ap344290
  • 21.sp1 ap358730
  • 21.sp1 ap347983
  • 21.sp1 ap350379
  • 21.0 ap347930
  • 21.0 ap343616
  • 21.0 ap365730
  • 21.0 ap343864
  • 21.sp1 ap347975
  • 21.sp1 ap355774
  • 21.0 ap349390
  • 21.0 ap342669
  • 21.sp1 ap343883
  • 21.sp1 ap344600
  • 21.sp1 ap355616
  • 21.sp1 ap364471
  • 21.sp1 ap355825
  • 21.0 ap357083
  • 21.sp1 ap360373
  • 21.sp1 ap354755
  • 21.sp1 ap342669
  • 21.0 ap347603
  • 21.0 ap360586
  • 21.0 ap360912
  • 21.sp1 ap358889
  • 21.sp1 ap364239
  • 21.sp1 ap247533
  • 21.sp1 ap345755
  • 21.0 ap355825
  • 21.0 ap342719
  • 21.sp1 ap351160
  • 21.sp1 ap379473
  • 21.sp1 ap355904
  • 21.0 ap361533
  • 21.0 ap339206
  • 21.sp1 ap350584
  • 21.sp1 ap343229
  • 21.sp1 ap350497
  • 21.sp1 ap346253
  • 21.0 ap346577
  • 21.sp1 ap346183
  • 21.0 ap350474
  • 21.sp1 ap351898
  • 21.sp1 ap364243
  • 21.sp1 ap352728
  • 21.0 ap343927
  • 21.0 ap352109
  • 21.0 ap249376
  • 21.sp1 ap243808
  • 21.sp1 ap344270
  • 21.sp1 ap343927
  • 21.0 ap353843
  • 21.sp1 ap370654
  • 21.sp1 ap358582
  • 21.sp1 ap352969
  • 21.0 ap359465
  • 21.0 ap342483
  • 21.sp1 ap347506
  • 21.sp1 ap359536
  • 21.0 ap346261
  • 21.sp1 ap352402
  • 21.sp1 ap339477
  • 21.0 ap347905
  • 21.0 ap362532
  • 21.sp1 ap356503
  • 21.0 ap347685
  • 21.sp1 ap352082
  • 21.sp1 ap361338
  • 21.sp1 ap358411
  • 21.sp1 ap369219
  • 21.sp1 ap233913
  • 21.0 ap355638
  • 21.sp1 ap350491
  • 21.0 ap350303
  • 21.sp1 ap367109
  • 21.0 ap355894
  • 21.sp1 ap364559
  • 21.sp1 ap354090
  • 21.sp1 ap353520
  • 21.sp1 ap343410
  • 21.sp1 ap365379
  • 21.sp1 ap358640
  • 21.sp1 ap378258
  • 21.0 ap353499
  • 21.sp1 ap350308
  • 21.sp1 ap366290
  • 21.sp1 ap349222
  • 21.sp1 ap235960
  • 21.sp1 ap360295
  • 21.0 ap362825
  • 21.sp1 ap364898
  • 21.0 ap359433
  • 21.0 ap347548
  • 21.0 ap349850
  • 21.sp1 ap362848
  • 21.sp1 ap347896
  • 21.0 ap347506
  • 21.0 ap342461
  • 21.0 ap362637
  • 21.sp1 ap353406
  • 21.0 ap245441
  • 21.sp1 ap346085
  • 21.sp1 ap357670
  • 21.sp1 ap364304
  • 21.sp1 ap368604
  • 21.sp1 ap345013
  • 21.sp1 ap348891
  • 21.sp1 ap373276
  • 21.sp1 ap343864
  • 21.0 ap350573
  • 21.sp1 ap354454
  • 21.0 ap361412
  • 21.sp1 ap358578
  • 21.0 ap345738
  • 21.sp1 ap350090
  • 21.0 ap344083
  • 21.sp1 ap341350
  • 21.sp1 ap342719
  • 21.0 ap364879
  • 21.0 ap343579
  • 21.sp1 ap355027
  • 21.0 ap348431
  • 21.0 ap342060
  • 21.sp1 ap346129
  • 21.0 ap339897
  • 21.sp1 ap354355
  • 21.sp1 ap352896
  • 21.sp1 ap348472
  • 21.0 ap346724
  • 21.0 ap361559
  • 21.sp1 ap372351
  • 21.0 ap349384
  • 21.0 ap355027
  • 21.sp1 ap358508
  • 21.sp1 ap344083
  • 21.sp1 ap358887
  • 21.sp1 ap354557
  • 21.sp1 ap342946
  • 21.sp1 ap354180
  • 21.sp1 ap359808
  • 21.sp1 ap350110
  • 21.0 ap343675
  • 21.sp1 ap352806
  • 21.sp1 ap249383
  • 21.sp1 ap354559
  • 21.sp1 ap372110
  • 21.0 ap352340
  • 21.sp1 ap346076
  • 21.sp1 ap369132
  • 21.0 ap358726
  • 21.sp1 ap359172
  • 21.sp1 ap355914
  • 21.sp1 ap374144
  • 21.0 ap358019
  • 21.sp1 ap356271
  • 21.sp1 ap356584
  • 21.sp1 ap357087
  • 21.sp1 ap360265
  • 21.0 ap359119
  • 21.sp1 ap361533
  • 21.sp1 ap363845
  • 21.0 ap345059
  • 21.0 ap348527
  • 21.sp1 ap361876
  • 23.0 ap385283
  • 23.0 ap385314
  • 23.0 ap385274
  • 23.0 ap385318
  • 23.0 ap385327
  • 23.0 ap385334
  • RI.2023.07
  • 23.0 ap385341
  • 23.0 ap385329
  • 23.0 ap385346
  • 23.0 ap385351
  • RI.2023.08
  • 23.0 ap385360
  • 23.0 ap385355
  • 23.0 ap385333
  • 23.0 ap385368
  • 23.0 ap385370
  • 23.0 ap385366
  • 23.0 ap385373
  • 23.0 ap385379
  • RI.2023.09
  • 23.0 ap385380
  • 23.0 ap385330
  • 23.0 ap385352
  • 23.0 ap385384
  • 23.0 ap385390
  • 23.0 ap385389
  • 23.0 ap385396
  • 23.0 ap385399
  • RI.2023.10
  • 23.0 ap385404
  • 23.0 ap385374
  • 23.0 ap385413
  • 23.0 ap385407
  • 23.0 ap385395
  • 23.0 ap385405
  • RI.2023.11
  • 23.0 ap385429
  • 23.0 ap385430
  • 23.0 ap385444
  • RI.2023.12
  • 23.0 ap385441
  • 23.0 ap385424
  • 23.0 ap385453
  • RI.2024.01
  • 23.0 ap385472
  • 23.0 ap385459
  • RI.2024.02
  • 23.0 ap385475
  • RI.2024.03
  • 23.0 ap385487
  • 23.0 ap385507
  • RI.2024.04
  • RI.2024.05
  • 23.0 ap385528
  • RI.2024.06
  • RI.2024.07
  • RI.2024.08
  • RI.2024.09
  • RI.2024.10
Problem Types
TypeCWE IDDescription
cweCWE-789Uncontrolled Memory Allocation
Type: cwe
CWE ID: CWE-789
Description: Uncontrolled Memory Allocation
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt
N/A
https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
N/A
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt
Resource: N/A
Hyperlink: https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
Resource: N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@cisco.com
Published At:22 Jan, 2025 | 17:15
Updated At:06 Aug, 2025 | 20:02

A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition. This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Cisco Systems, Inc.
cisco
>>broadworks_network_server>>Versions before 2024.11(exclusive)
cpe:2.3:a:cisco:broadworks_network_server:*:*:*:*:release_independent:*:*:*
Weaknesses
CWE IDTypeSource
CWE-789Primarypsirt@cisco.com
CWE ID: CWE-789
Type: Primary
Source: psirt@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.htmlpsirt@cisco.com
Not Applicable
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmtpsirt@cisco.com
Vendor Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphApsirt@cisco.com
Not Applicable
Hyperlink: https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
Source: psirt@cisco.com
Resource:
Not Applicable
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt
Source: psirt@cisco.com
Resource:
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
Source: psirt@cisco.com
Resource:
Not Applicable

Change History

0
Information is not available yet

Similar CVEs

251Records found

CVE-2016-6384
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.97% / 82.80%
||
7 Day CHG~0.00%
Published-05 Oct, 2016 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco IOS 12.2 through 12.4 and 15.0 through 15.6 and IOS XE 3.1 through 3.17 and 16.2 allow remote attackers to cause a denial of service (device reload) via crafted fields in an H.323 message, aka Bug ID CSCux04257.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-6393
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-8.65% / 92.07%
||
7 Day CHG~0.00%
Published-05 Oct, 2016 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The AAA service in Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.1 through 3.18 and 16.2 allows remote attackers to cause a denial of service (device reload) via a failed SSH connection attempt that is mishandled during generation of an error-log message, aka Bug ID CSCuy87667.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xen/a
CVE-2024-20314
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.17% / 77.78%
||
7 Day CHG~0.00%
Published-27 Mar, 2024 | 16:57
Updated-30 Jul, 2025 | 13:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the IPv4 Software-Defined Access (SD-Access) fabric edge node feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization and stop all traffic processing, resulting in a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain IPv4 packets. An attacker could exploit this vulnerability by sending certain IPv4 packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Softwareios_xe
CWE ID-CWE-783
Operator Precedence Logic Error
CVE-2024-20339
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.78% / 72.71%
||
7 Day CHG~0.00%
Published-23 Oct, 2024 | 17:09
Updated-08 Aug, 2025 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability

A vulnerability in the TLS processing feature of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an issue that occurs when TLS traffic is processed. An attacker could exploit this vulnerability by sending certain TLS traffic over IPv4 through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition and impacting traffic to and through the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defense_softwareCisco Firepower Threat Defense Softwarefirepower_threat_defense_software
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2024-20502
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.10% / 27.28%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 18:23
Updated-04 Jun, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to insufficient resource management while establishing SSL VPN sessions. An attacker could exploit this vulnerability by sending a series of crafted HTTPS requests to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meraki_mx84meraki_mx64w_firmwaremeraki_mx600_firmwaremeraki_mx105meraki_mx250meraki_mx450meraki_mx105_firmwaremeraki_mx450_firmwaremeraki_z4cmeraki_z3c_firmwaremeraki_z3cmeraki_mx68cw_firmwaremeraki_mx100_firmwaremeraki_mx65meraki_mx85meraki_mx95_firmwaremeraki_z4c_firmwaremeraki_mx67cmeraki_mx64_firmwaremeraki_mx85_firmwaremeraki_mx95meraki_mx100meraki_mx68cwmeraki_z3_firmwaremeraki_mx75meraki_mx68w_firmwaremeraki_mx64wmeraki_mx250_firmwaremeraki_mx68meraki_mx67c_firmwaremeraki_mx68wmeraki_vmx_firmwaremeraki_mx400meraki_mx67wmeraki_mx65wmeraki_mx75_firmwaremeraki_mx67w_firmwaremeraki_z4_firmwaremeraki_mx600meraki_mx67meraki_z4meraki_z3meraki_mx64meraki_vmxmeraki_mx67_firmwaremeraki_mx65w_firmwaremeraki_mx68_firmwaremeraki_mx400_firmwaremeraki_mx65_firmwaremeraki_mx84_firmwareCisco Meraki MX Firmwaremeraki_z1meraki_mx
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-20484
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.82%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:29
Updated-04 Apr, 2025 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Enterprise Chat and Email Denial of Service Vulnerability

A vulnerability in the External Agent Assignment Service (EAAS) feature of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of Media Routing Peripheral Interface Manager (MR PIM) traffic that is received by an affected device. An attacker could exploit this vulnerability by sending crafted MR PIM traffic to an affected device. A successful exploit could allow the attacker to trigger a failure on the MR PIM connection between Cisco ECE and Cisco Unified Contact Center Enterprise (CCE), leading to a DoS condition on EAAS that would prevent customers from starting chat, callback, or delayed callback sessions. Note: When the attack traffic stops, the EAAS process must be manually restarted to restore normal operation. To restart the process in the System Console, choose Shared Resources > Services > Unified CCE > EAAS, then click Start.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-enterprise_chat_and_emailCisco Enterprise Chat and Emailenterprise_chat_and_email
CWE ID-CWE-20
Improper Input Validation
CVE-2024-20498
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.08% / 25.18%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 18:23
Updated-04 Jun, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device. These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meraki_mx84meraki_mx64w_firmwaremeraki_mx600_firmwaremeraki_mx105meraki_mx250meraki_mx450meraki_mx105_firmwaremeraki_mx450_firmwaremeraki_z4cmeraki_z3c_firmwaremeraki_z3cmeraki_mx68cw_firmwaremeraki_mx100_firmwaremeraki_mx65meraki_mx85meraki_mx95_firmwaremeraki_z4c_firmwaremeraki_mx67cmeraki_mx64_firmwaremeraki_mx85_firmwaremeraki_mx95meraki_mx100meraki_mx68cwmeraki_z3_firmwaremeraki_mx75meraki_mx68w_firmwaremeraki_mx64wmeraki_mx250_firmwaremeraki_mx68meraki_mx67c_firmwaremeraki_mx68wmeraki_vmx_firmwaremeraki_mx400meraki_mx67wmeraki_mx65wmeraki_mx75_firmwaremeraki_mx67w_firmwaremeraki_z4_firmwaremeraki_mx600meraki_mx67meraki_z4meraki_z3meraki_mx64meraki_vmxmeraki_mx67_firmwaremeraki_mx65w_firmwaremeraki_mx68_firmwaremeraki_mx400_firmwaremeraki_mx65_firmwaremeraki_mx84_firmwareCisco Meraki MX Firmwaremeraki_z1meraki_mx
CWE ID-CWE-415
Double Free
CVE-2024-20501
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.08% / 25.18%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 18:23
Updated-04 Jun, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device. These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meraki_mx84meraki_mx64w_firmwaremeraki_mx600_firmwaremeraki_mx105meraki_mx250meraki_mx450meraki_mx105_firmwaremeraki_mx450_firmwaremeraki_z4cmeraki_z3c_firmwaremeraki_z3cmeraki_mx68cw_firmwaremeraki_mx100_firmwaremeraki_mx65meraki_mx85meraki_mx95_firmwaremeraki_z4c_firmwaremeraki_mx67cmeraki_mx64_firmwaremeraki_mx85_firmwaremeraki_mx95meraki_mx100meraki_mx68cwmeraki_z3_firmwaremeraki_mx75meraki_mx68w_firmwaremeraki_mx64wmeraki_mx250_firmwaremeraki_mx68meraki_mx67c_firmwaremeraki_mx68wmeraki_vmx_firmwaremeraki_mx400meraki_mx67wmeraki_mx65wmeraki_mx75_firmwaremeraki_mx67w_firmwaremeraki_z4_firmwaremeraki_mx600meraki_mx67meraki_z4meraki_z3meraki_mx64meraki_vmxmeraki_mx67_firmwaremeraki_mx65w_firmwaremeraki_mx68_firmwaremeraki_mx400_firmwaremeraki_mx65_firmwaremeraki_mx84_firmwareCisco Meraki MX Firmwaremeraki_z1meraki_mx
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20433
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.44% / 62.25%
||
7 Day CHG+0.11%
Published-25 Sep, 2024 | 16:26
Updated-03 Oct, 2024 | 13:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a buffer overflow when processing crafted RSVP packets. An attacker could exploit this vulnerability by sending RSVP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeiosCisco IOS XE SoftwareIOSios_xe
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20376
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.35% / 56.55%
||
7 Day CHG~0.00%
Published-01 May, 2024 | 16:43
Updated-01 Aug, 2024 | 21:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a DoS condition. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to cause the affected device to reload.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco IP Phones with Multiplatform FirmwareCisco PhoneOSip_phone_7861_with_multiplatform_firmwareip_phone_6841_with_multiplatform_firmwareip_phone_6821_with_multiplatform_firmwareip_phone_7811_with_multiplatform_firmwareip_phone_7841_with_multiplatform_firmwareip_phone_6825_with_multiplatform_firmwareip_phone_7821_with_multiplatform_firmwareip_phone_6871_with_multiplatform_firmwareip_phone_6861_with_multiplatform_firmwareip_phone_6851_with_multiplatform_firmwareip_phone_8800_series_with_multiplatform_firmwarevideo_phone_8875_firmware
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20436
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.72% / 71.57%
||
7 Day CHG+0.17%
Published-25 Sep, 2024 | 16:26
Updated-08 Oct, 2024 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the HTTP Server feature of Cisco IOS XE Software when the Telephony Service feature is enabled could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a null pointer dereference when accessing specific URLs. An attacker could exploit this vulnerability by sending crafted HTTP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, causing a DoS condition on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Softwareios_xe
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2024-20311
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.17% / 77.78%
||
7 Day CHG~0.00%
Published-27 Mar, 2024 | 16:50
Updated-30 Jul, 2025 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. Note: This vulnerability could be exploited over either IPv4 or IPv6 transport.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iosios_xeCisco IOS XE SoftwareIOSios_xeios
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2024-20375
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.33% / 55.57%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 17:02
Updated-01 Aug, 2025 | 20:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the SIP call processing function of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper parsing of SIP messages. An attacker could exploit this vulnerability by sending a crafted SIP message to an affected Cisco Unified CM or Cisco Unified CM SME device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition that interrupts the communications of reliant voice and video devices.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_managerCisco Unified Communications Manager
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20304
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.10% / 27.52%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 16:39
Updated-03 Oct, 2024 | 14:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software Packet Memory Exhaustion Vulnerability

A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device. This vulnerability exists because the Mtrace2 code does not properly handle packet memory. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to exhaust the incoming UDP packet memory. The affected device would not be able to process higher-level UDP-based protocols packets, possibly causing a denial of service (DoS) condition. Note: This vulnerability can be exploited using IPv4 or IPv6.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Softwareios_xr
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2024-20308
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.99% / 75.96%
||
7 Day CHG~0.00%
Published-27 Mar, 2024 | 17:22
Updated-30 Jun, 2025 | 15:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic..

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeiosCisco IOS XE SoftwareIOSios_xeios
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20307
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-1.23% / 78.34%
||
7 Day CHG~0.00%
Published-27 Mar, 2024 | 17:23
Updated-30 Jul, 2025 | 12:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap overflow, resulting in an affected device reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iosios_xeCisco IOS XE SoftwareIOS
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-20500
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.15% / 36.55%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 18:23
Updated-04 Jun, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device. This vulnerability is due to insufficient resource management when establishing TLS/SSL sessions. An attacker could exploit this vulnerability by sending a series of crafted TLS/SSL messages to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meraki_mx84meraki_mx64w_firmwaremeraki_mx600_firmwaremeraki_mx105meraki_mx250meraki_mx450meraki_mx105_firmwaremeraki_mx450_firmwaremeraki_z4cmeraki_z3c_firmwaremeraki_z3cmeraki_mx68cw_firmwaremeraki_mx100_firmwaremeraki_mx65meraki_mx85meraki_mx95_firmwaremeraki_z4c_firmwaremeraki_mx67cmeraki_mx85_firmwaremeraki_mx64_firmwaremeraki_mx95meraki_mx100meraki_mx68cwmeraki_z3_firmwaremeraki_mx75meraki_mx68w_firmwaremeraki_mx64wmeraki_mx250_firmwaremeraki_mx68meraki_mx67c_firmwaremeraki_mx68wmeraki_vmx_firmwaremeraki_mx400meraki_mx67wmeraki_mx65wmeraki_mx75_firmwaremeraki_mx67w_firmwaremeraki_z4_firmwaremeraki_mx600meraki_mx67meraki_z4meraki_z3meraki_mx64meraki_vmxmeraki_mx67_firmwaremeraki_mx65w_firmwaremeraki_mx68_firmwaremeraki_mx400_firmwaremeraki_mx65_firmwaremeraki_mx84_firmwareCisco Meraki MX Firmwaremeraki_z1meraki_mx
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-20505
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4||MEDIUM
EPSS-0.55% / 67.06%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 21:23
Updated-25 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ClamAV Memory Handling DoS

A vulnerability in the PDF parsing module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to an out of bounds read. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. An exploit could allow the attacker to terminate the scanning process.

Action-Not Available
Vendor-ClamAVCisco Systems, Inc.
Product-clamavClamAV
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-20290
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-3.21% / 86.53%
||
7 Day CHG~0.00%
Published-07 Feb, 2024 | 16:16
Updated-13 Feb, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .

Action-Not Available
Vendor-Fedora ProjectCisco Systems, Inc.
Product-secure_endpointsecure_endpoint_private_cloudfedoraCisco Secure EndpointCisco Secure Endpoint Private Cloud Administration PortalCisco Secure Endpoint Private Cloud Console
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-20499
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.08% / 25.18%
||
7 Day CHG~0.00%
Published-02 Oct, 2024 | 18:23
Updated-04 Jun, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device. These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meraki_mx84meraki_mx64w_firmwaremeraki_mx600_firmwaremeraki_mx105meraki_mx250meraki_mx450meraki_mx105_firmwaremeraki_mx450_firmwaremeraki_z4cmeraki_z3c_firmwaremeraki_z3cmeraki_mx68cw_firmwaremeraki_mx100_firmwaremeraki_mx65meraki_mx85meraki_mx95_firmwaremeraki_z4c_firmwaremeraki_mx67cmeraki_mx85_firmwaremeraki_mx64_firmwaremeraki_mx95meraki_mx100meraki_mx68cwmeraki_z3_firmwaremeraki_mx75meraki_mx68w_firmwaremeraki_mx64wmeraki_mx250_firmwaremeraki_mx68meraki_mx67c_firmwaremeraki_mx68wmeraki_vmx_firmwaremeraki_mx400meraki_mx67wmeraki_mx65wmeraki_mx75_firmwaremeraki_mx67w_firmwaremeraki_z4_firmwaremeraki_mx600meraki_mx67meraki_z4meraki_z3meraki_mx64meraki_vmxmeraki_mx67_firmwaremeraki_mx65w_firmwaremeraki_mx68_firmwaremeraki_mx400_firmwaremeraki_mx65_firmwaremeraki_mx84_firmwareCisco Meraki MX Firmwaremeraki_z1meraki_mx
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20330
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.11% / 30.15%
||
7 Day CHG~0.00%
Published-23 Oct, 2024 | 17:08
Updated-06 Aug, 2025 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series TCP UDP Snort 2 and Snort 2 Denial of Service Vulnerability

A vulnerability in the Snort 2 and Snort 3 TCP and UDP detection engine of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Appliances could allow an unauthenticated, remote attacker to cause memory corruption, which could cause the Snort detection engine to restart unexpectedly. This vulnerability is due to improper memory management when the Snort detection engine processes specific TCP or UDP packets. An attacker could exploit this vulnerability by sending crafted TCP or UDP packets through a device that is inspecting traffic using the Snort detection engine. A successful exploit could allow the attacker to restart the Snort detection engine repeatedly, which could cause a denial of service (DoS) condition. The DoS condition impacts only the traffic through the device that is examined by the Snort detection engine. The device can still be managed over the network. Note: Once a memory block is corrupted, it cannot be cleared until the Cisco Firepower 2100 Series Appliance is manually reloaded. This means that the Snort detection engine could crash repeatedly, causing traffic that is processed by the Snort detection engine to be dropped until the device is manually reloaded.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_2120firepower_2110firepower_threat_defensefirepower_2130firepower_2100firepower_2140Cisco Firepower Threat Defense Softwarefirepower_threat_defense_software
CWE ID-CWE-788
Access of Memory Location After End of Buffer
CVE-2024-20380
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.50% / 64.91%
||
7 Day CHG~0.00%
Published-18 Apr, 2024 | 19:19
Updated-23 Jul, 2025 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ClamAV HTML Parser Denial of Service Vulnerability

A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to an issue in the C to Rust foreign function interface. An attacker could exploit this vulnerability by submitting a crafted file containing HTML content to be scanned by ClamAV on an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software.

Action-Not Available
Vendor-Cisco Systems, Inc.ClamAV
Product-clamavClamAVclam_antivirus
CWE ID-CWE-475
Undefined Behavior for Input to API
CVE-2016-1347
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-4.32% / 88.45%
||
7 Day CHG~0.00%
Published-24 Mar, 2016 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Wide Area Application Services (WAAS) Express implementation in Cisco IOS 15.1 through 15.5 allows remote attackers to cause a denial of service (device reload) via a crafted TCP segment, aka Bug ID CSCuq59708.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CVE-2016-1351
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.83% / 82.18%
||
7 Day CHG~0.00%
Published-26 Mar, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Locator/ID Separation Protocol (LISP) implementation in Cisco IOS 15.1 and 15.2 and NX-OS 4.1 through 6.2 allows remote attackers to cause a denial of service (device reload) via a crafted header in a packet, aka Bug ID CSCuu64279.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosnx-osn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-40114
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-1.77% / 81.89%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 18:56
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Cisco Products Snort Memory Leak Denial of Service Vulnerability

Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload.

Action-Not Available
Vendor-snortCisco Systems, Inc.
Product-secure_firewall_management_centersnortunified_threat_defensefirepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2021-40122
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.38% / 58.39%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 02:50
Updated-07 Nov, 2024 | 21:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Meeting Server Call Bridge Denial of Service Vulnerability

A vulnerability in an API of the Call Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper handling of large series of message requests. An attacker could exploit this vulnerability by sending a series of messages to the vulnerable API. A successful exploit could allow the attacker to cause the affected device to reload, dropping all ongoing calls and resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meeting_serverCisco Meeting Server
CWE ID-CWE-399
Not Available
CWE ID-CWE-404
Improper Resource Shutdown or Release
CVE-2024-20351
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.58% / 67.84%
||
7 Day CHG~0.00%
Published-23 Oct, 2024 | 17:09
Updated-11 Aug, 2025 | 14:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software Snort Firewall Denial of Service Vulnerability

A vulnerability in the TCP/IP traffic handling function of the Snort Detection Engine of Cisco Firepower Threat Defense (FTD) Software and Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause legitimate network traffic to be dropped, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of TCP/IP network traffic. An attacker could exploit this vulnerability by sending a large amount of TCP/IP network traffic through the affected device. A successful exploit could allow the attacker to cause the Cisco FTD device to drop network traffic, resulting in a DoS condition. The affected device must be rebooted to resolve the DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defense_softwareCisco Firepower Threat Defense Softwarefirepower_threat_defense_software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-34769
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.21% / 43.40%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 02:26
Updated-07 Nov, 2024 | 21:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software for Catalyst 9000 Family Wireless Controllers CAPWAP Denial of Service Vulnerabilities

Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit the vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xecatalyst_9800-lcatalyst_9800-40_wireless_controllercatalyst_9800-40catalyst_9800-l-ccatalyst_9800-80_wireless_controllercatalyst_9800_embedded_wireless_controllercatalyst_9800catalyst_9800-clcatalyst_9800-80catalyst_9800-l-fCisco IOS XE Software
CWE ID-CWE-415
Double Free
CVE-2021-34741
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.74%
||
7 Day CHG~0.00%
Published-04 Nov, 2021 | 15:40
Updated-07 Nov, 2024 | 21:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance Denial of Service Vulnerability

A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-m680s395m380asyncosm690xm190s195m170m390xs695m390m690Cisco Email Security Appliance (ESA)
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2021-34698
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.52% / 65.72%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:46
Updated-07 Nov, 2024 | 21:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability

A vulnerability in the proxy service of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management in the proxy service of an affected device. An attacker could exploit this vulnerability by establishing a large number of HTTPS connections to the affected device. A successful exploit could allow the attacker to cause the system to stop processing new connections, which could result in a DoS condition. Note: Manual intervention may be required to recover from this situation.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asyncosweb_security_appliance_s190web_security_appliance_s690web_security_appliance_s680web_security_appliance_s690xweb_security_appliance_s170web_security_appliance_s390web_security_appliance_s380Cisco Web Security Appliance (WSA)
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2021-34735
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-1.51% / 80.44%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:46
Updated-07 Nov, 2024 | 21:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco ATA 190 Series Analog Telephone Adapter Software Vulnerabilities

Multiple vulnerabilities in the Cisco ATA 190 Series Analog Telephone Adapter Software could allow an attacker to perform a command injection attack resulting in remote code execution or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ata_192_firmwareata_190ata_190_firmwareata_191_firmwareata_191ata_192Cisco Analog Telephone Adaptor (ATA) Software
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2019-12655
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.22% / 78.27%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 20:15
Updated-19 Nov, 2024 | 18:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software FTP Application Layer Gateway for NAT, NAT64, and ZBFW Denial of Service Vulnerability

A vulnerability in the FTP application layer gateway (ALG) functionality used by Network Address Translation (NAT), NAT IPv6 to IPv4 (NAT64), and the Zone-Based Policy Firewall (ZBFW) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a buffer overflow that occurs when an affected device inspects certain FTP traffic. An attacker could exploit this vulnerability by performing a specific FTP transfer through the device. A successful exploit could allow the attacker to cause the device to reload.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iosCisco IOS XE Software 3.16.8S
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-12647
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.16% / 77.71%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 20:05
Updated-19 Nov, 2024 | 18:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS and IOS XE Software IP Ident Denial of Service Vulnerability

A vulnerability in the Ident protocol handler of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability exists because the affected software incorrectly handles memory structures, leading to a NULL pointer dereference. An attacker could exploit this vulnerability by opening a TCP connection to specific ports and sending traffic over that connection. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asr_920-10sz-pdncs_4216asr_920-12cz-a4451-x43514431asr_900asr_920-24sz-im4221cloud_services_router_1000v1100asr_1002-hxasr_920-24sz-masr_10004321ios_xencs_4206asr_920-4sz-anetwork_convergence_system_520asr_920-12cz-dasr_1001-xasr_1001-hxasr_920-12sz-imasr_920-4sz-dasr_1002-xncs_4202ncs_4201asr_920-24tz-mCisco IOS
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2019-12653
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.81% / 73.20%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 20:15
Updated-19 Nov, 2024 | 18:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Raw Socket Transport Denial of Service Vulnerability

A vulnerability in the Raw Socket Transport feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of Raw Socket Transport payloads. An attacker could exploit this vulnerability by establishing a TCP session and then sending a malicious TCP segment via IPv4 to an affected device. This cannot be exploited via IPv6, as the Raw Socket Transport feature does not support IPv6 as a network layer protocol.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeasr_903asr_907asr_902asr_914asr_902uCisco IOS XE Software
CWE ID-CWE-20
Improper Input Validation
CVE-2019-12652
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-3.18% / 86.45%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 20:16
Updated-19 Nov, 2024 | 18:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Catalyst 4000 Series Switches TCP Denial of Service Vulnerability

A vulnerability in the ingress packet processing function of Cisco IOS Software for Cisco Catalyst 4000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when processing TCP packets directed to the device on specific Cisco Catalyst 4000 Series Switches. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device. A successful exploit could cause the affected device to run out of buffer resources, impairing operations of control plane and management plane protocols, resulting in a DoS condition. This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ioscatalyst_4500_supervisor_engine_6-ecatalyst_4500_supervisor_engine_6l-ecatalyst_4948ecatalyst_4900mcatalyst_4948e-fCisco IOS 15.0(1)XO1
CWE ID-CWE-399
Not Available
CVE-2023-44487
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-94.41% / 99.98%
||
7 Day CHG-0.06%
Published-10 Oct, 2023 | 00:00
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-10-31||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

Action-Not Available
Vendor-grpckonghqopenrestykazu-yamamotoistiolinecorptraefiknghttp2linkerdvarnish_cache_projectenvoyproxyakkadenacaddyserveramazonprojectcontourn/aJenkinsF5, Inc.The Netty ProjectEclipse Foundation AISBLThe IETF Administration LLC (IETF LLC)Apple Inc.NetApp, Inc.Microsoft CorporationRed Hat, Inc.Debian GNU/LinuxNode.js (OpenJS Foundation)The Apache Software FoundationFedora ProjectGoCisco Systems, Inc.Facebook
Product-nexus_9516openshift_serverlesscbl-marinernexus_34180ycnexus_3132c-zbig-ip_ddos_hybrid_defendernexus_3132q-xlproxygenarmerianexus_3132q-x\/3132q-xlunified_contact_center_enterprise_-_live_data_servernexus_9336pq_aci_spineintegration_service_registrynexus_9236c_switchwindows_11_22h2migration_toolkit_for_containersnexus_9396px.netnexus_31108pc-vnexus_9336c-fx2nexus_9396tx_switchopenshiftnginx_ingress_controllernexus_9236cadvanced_cluster_securitykong_gatewaynexus_93108tc-ex-24secure_web_appliancewindows_server_2016windows_server_2019openshift_container_platform_assisted_installerbig-ip_next_service_proxy_for_kubernetesnexus_3500integration_camel_knexus_9396txnexus_9372txnexus_93216tc-fx2apisixnginx_plusnexus_9800linkerdsupport_for_spring_bootnexus_3132q-xnode_healthcheck_operator3scale_api_management_platformnexus_9500nexus_93120txnexus_3264c-enexus_9500_4-slotopenstack_platformtelepresence_video_communication_servernexus_36180yc-rtomcatnexus_3132qnexus_3172tq-32topenshift_distributed_tracingnexus_9348gc-fxpbig-ip_nextenterprise_chat_and_emailbig-ip_global_traffic_managerbig-ip_fraud_protection_serviceunified_contact_center_enterprisecontouropenshift_container_platformnexus_3100-vsecure_malware_analyticsnexus_92160yc_switchnexus_34200yc-smnexus_9348d-gx2anexus_9364c-gxmigration_toolkit_for_virtualizationnexus_3100-zfog_directornexus_9804nexus_3432d-sultra_cloud_core_-_session_management_functionnexus_3524swiftnio_http\/2nexus_3400cryostatnexus_31108pv-vnexus_9372tx_switchnexus_3172tqbig-ip_advanced_web_application_firewalljboss_fusenexus_3172pq-xlfedoranexus_9272qopenshift_developer_tools_and_servicesnexus_9500rdecision_managernexus_9500_supervisor_b\+nexus_3548-x\/xlnexus_9232enexus_92348gc-xunified_attendant_console_advancedopenshift_sandboxed_containersultra_cloud_core_-_serving_gateway_functionnexus_9332d-h2rnexus_93128nexus_3548-xnexus_9200ycnexus_3064tbig-ip_policy_enforcement_managernexus_93108tc-exlogging_subsystem_for_red_hat_openshiftasp.net_corebig-ip_local_traffic_managernexus_93360yc-fx2big-ip_webacceleratornexus_3132q-vnexus_9336c-fx2-esolrcaddyistiounified_contact_center_management_portalnexus_9332cnexus_9200nexus_9516_switchnexus_3548nexus_3172pq\/pq-xlnexus_3048secure_dynamic_attributes_connectornexus_93600cd-gxnexus_9372px_switchnexus_3164qazure_kubernetes_serviceopenshift_secondary_scheduler_operatornexus_9500_8-slotnexus_9508openshift_virtualizationprime_cable_provisioningnexus_9364copensearch_data_preppernexus_93128tx_switchhttpwindows_10_21h2firepower_threat_defensesingle_sign-onnexus_9221cgobuild_of_optaplannerprime_access_registrarnetworkingnexus_9500_16-slotnexus_3232cnexus_93108tc-fxvarnish_cachenexus_9504jboss_enterprise_application_platformwindows_10_1607nexus_92304qcintegration_camel_for_spring_bootrun_once_duration_override_operatornexus_9716d-gxnexus_9000vnexus_3016windows_11_21h2openshift_pipelinesnexus_9408visual_studio_2022nexus_9336pq_acinexus_93180yc-fx3debian_linuxnx-osceph_storagenexus_9316d-gxnginxnexus_93180tc-exadvanced_cluster_management_for_kubernetesprime_network_registrarnexus_3408-straefiknexus_3064xnexus_9336pq_aci_spine_switchnexus_9372pxunified_contact_center_domain_managernettynexus_3264qnexus_3100vnexus_9372tx-e_switchnexus_93108tc-ex_switchtraffic_serverjboss_core_servicesnexus_9300jboss_a-mqjboss_a-mq_streamsnexus_3100nexus_93240tc-fx2machine_deletion_remediation_operatorbig-ip_application_security_managerbuild_of_quarkusnexus_93180yc-ex_switchnexus_9372tx-enode_maintenance_operatornexus_93180yc-ex-24nexus_3064openshift_dev_spacesnexus_9504_switchweb_terminalnexus_9736pqself_node_remediation_operatorcertification_for_red_hat_enterprise_linuxnexus_3172pqnexus_93128txiot_field_network_directornexus_3636c-rnexus_3064-tnexus_9372px-ehttp2nexus_92300yc_switchnexus_9364d-gx2aservice_interconnectnexus_93180yc-fxios_xeopenrestynexus_31128pqopenshift_service_meshbig-ip_analyticsopenshift_data_sciencebig-ip_application_acceleration_managernexus_9336pqnetwork_observability_operatorbig-ip_link_controllernexus_9372px-e_switchnexus_9332pq_switchnexus_9500_supervisor_bhttp_servernexus_93180yc-fx-24windows_10_22h2node.jsnexus_3600nexus_93180lc-exnexus_9636pqservice_telemetry_frameworkbig-ip_application_visibility_and_reportingmigration_toolkit_for_applicationsnexus_9808nexus_93108tc-fx-24nexus_92160yc-xnexus_31108tc-vnexus_3200nexus_9332d-gx2bcrosswork_situation_managernexus_3064-xnghttp2nexus_93180yc-fx3sbig-ip_websafenexus_3464cnexus_93180yc-exnexus_3172nexus_9536pqastra_control_centernexus_9396px_switchnexus_92300ycopenshift_api_for_data_protectionh2ojettynexus_9500_supervisor_anexus_9500_supervisor_a\+nexus_9272q_switchsatellitenexus_93180yc-fx3hprocess_automationdata_center_network_manageransible_automation_platformcost_managementsecure_web_appliance_firmwarejboss_data_gridnexus_9508_switchnexus_3064-32tcert-manager_operator_for_red_hat_openshiftoncommand_insightnexus_93240yc-fx2ios_xrnexus_93180lc-ex_switchfence_agents_remediation_operatorcrosswork_zero_touch_provisioningnexus_3232c_ultra_cloud_core_-_policy_control_functionbig-ip_carrier-grade_natnexus_3172tq-xlnexus_3524-xexpresswaygrpcbusiness_process_automationnexus_93108tc-fx3hnexus_92304qc_switchwindows_10_1809enterprise_linuxenvoyquaycrosswork_data_gatewaynexus_93108tc-fx3pbig-ip_domain_name_systemnexus_3548-xlnexus_93120tx_switchnexus_9432pqopenshift_gitopsnexus_3524-xlnexus_3232nexus_9332pqnexus_3524-x\/xlbig-ip_advanced_firewall_managerprime_infrastructurenexus_3016qjenkinsbig-ip_ssl_orchestratornexus_9348gc-fx3big-ip_access_policy_managerwindows_server_2022connected_mobile_experiencesn/ahttpHTTP/2
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-1460
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.35%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:06
Updated-08 Nov, 2024 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOx Application Framework Denial of Service Vulnerability

A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iosic3000_industrial_compute_gatewaycgr1000_firmware829_industrial_integrated_services_routeric3000_industrial_compute_gateway_firmwarecgr1000809_industrial_integrated_services_routerCisco IOS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-1313
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.60% / 68.38%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:56
Updated-08 Nov, 2024 | 23:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software Enf Broker Denial of Service Vulnerability

Multiple vulnerabilities in the ingress packet processing function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Software
CWE ID-CWE-399
Not Available
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2021-1378
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 36.87%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 16:55
Updated-08 Nov, 2024 | 23:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco StarOS Denial of Service Vulnerability

A vulnerability in the SSH service of the Cisco StarOS operating system could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error that may occur under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to prevent the targeted service from receiving any traffic, which would lead to a DoS condition on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-starosCisco ASR 5000 Series Software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-1501
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.77% / 72.50%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 17:31
Updated-08 Nov, 2024 | 23:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software SIP Denial of Service Vulnerability

A vulnerability in the SIP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition.The vulnerability is due to a crash that occurs during a hash lookup for a SIP pinhole connection. An attacker could exploit this vulnerability by sending crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a crash and reload of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseadaptive_security_appliance_softwareCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2019-1968
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.44% / 62.12%
||
7 Day CHG~0.00%
Published-29 Aug, 2019 | 21:50
Updated-19 Nov, 2024 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco NX-OS Software NX-API Denial of Service Vulnerability

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP request to the NX-API on an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic. Note: The NX-API feature is disabled by default.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93180lc-exnexus_56128pnexus_9332pqnexus_3172tqnexus_93108tc-exnx-osnexus_3636c-rnexus_9508nexus_93120txnexus_93128txnexus_9336pq_aci_spinenexus_6004mds_9140nexus_3548-xlnexus_31128pqnexus_3132q-vnexus_9332cnexus_7000_9-slotnexus_9364cnexus_92348gc-xnexus_3172tq-32tnexus_9336c-fx2nexus_3164qmds_9200nexus_3524-xnexus_3132c-znexus_31108tc-vnexus_5548pnexus_9348gc-fxpnexus_5648qnexus_3172mds_9000nexus_9272qnexus_3464cmds_9700nexus_93216tc-fx2nexus_36180yc-rnexus_5672upnexus_93180yc-fxnexus_3264qnexus_3432d-snexus_34180ycnexus_9000vnexus_31108pc-vnexus_7700_18-slotnexus_5596upnexus_3524nexus_3548mds_9500nexus_7000_4-slotnexus_7700_6-slotnexus_3132qnexus_3016nexus_9372pxnexus_5696qnexus_92304qcnexus_92160yc-xnexus_7700_10-slotmds_9100nexus_9504nexus_3048nexus_9372tx-enexus_6001nexus_93108tc-fxnexus_93360yc-fx2nexus_3524-xlnexus_9396txnexus_7000_10-slotnexus_7000nexus_92300ycnexus_3064nexus_3232cnexus_5548upnexus_9396pxnexus_5596tnexus_3264c-enexus_7700_2-slotnexus_93240yc-fx2nexus_9372txnexus_5624qnexus_3548-xnexus_3132q-xlnexus_3064-tnexus_3172tq-xlnexus_93180yc-exnexus_3408-snexus_9372px-enexus_7000_18-slotnexus_9236cnexus_9516nexus_3172pq-xlnexus_7700Cisco NX-OS Software 6.0(2)A4(1)
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CVE-2019-1741
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.11% / 77.27%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 23:25
Updated-19 Nov, 2024 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Encrypted Traffic Analytics Denial of Service Vulnerability

A vulnerability in the Cisco Encrypted Traffic Analytics (ETA) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a logic error that exists when handling a malformed incoming packet, leading to access to an internal data structure after it has been freed. An attacker could exploit this vulnerability by sending crafted, malformed IP packets to an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-416
Use After Free
CVE-2021-1278
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.06% / 76.76%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 19:56
Updated-12 Nov, 2024 | 20:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN Denial of Service Vulnerabilities

Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-vedge_100b_routervedge_cloud_routersd-wan_vbond_orchestratorvedge_5000_routervedge_100_routersd-wan_firmwareios_xe_sd-wanvedge_2000_routersd-wan_vsmart_controller_firmwarevedge_100wm_routercatalyst_sd-wan_managervedge_1000_routervedge_100m_routerCisco SD-WAN Solution
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2021-1230
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.70% / 71.08%
||
7 Day CHG~0.00%
Published-24 Feb, 2021 | 19:30
Updated-08 Nov, 2024 | 23:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Nexus 9000 Series Fabric Switches ACI Mode BGP Route Installation Denial of Service Vulnerability

A vulnerability with the Border Gateway Protocol (BGP) for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to cause a routing process to crash, which could lead to a denial of service (DoS) condition. This vulnerability is due to an issue with the installation of routes upon receipt of a BGP update. An attacker could exploit this vulnerability by sending a crafted BGP update to an affected device. A successful exploit could allow the attacker to cause the routing process to crash, which could cause the device to reload. This vulnerability applies to both Internal BGP (IBGP) and External BGP (EBGP). Note: The Cisco implementation of BGP accepts incoming BGP traffic from explicitly configured peers only. To exploit this vulnerability, an attacker would need to send a specific BGP update message over an established TCP connection that appears to come from a trusted BGP peer.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93180lc-exnexus_9332pqnexus_93108tc-exnx-osnexus_9372pxnexus_9364c-gxnexus_9508nexus_93108tc-fx-24nexus_92304qcnexus_93120txnexus_92160yc-xnexus_93128txnexus_9316d-gxnexus_9336pq_aci_spinenexus_93108tc-ex-24nexus_9372tx-enexus_93108tc-fxnexus_93360yc-fx2nexus_9396txnexus_93180yc-fx3snexus_9332cnexus_9364cnexus_92300ycnexus_92348gc-xnexus_9336c-fx2nexus_9348gc-fxpnexus_9272qnexus_93180yc-fx-24nexus_9336c-fx2-enexus_9396pxnexus_93216tc-fx2nexus_93240yc-fx2nexus_93180yc-fxnexus_9372txnexus_93180yc-exnexus_93600cd-gxnexus_9000vnexus_9372px-enexus_9236cnexus_93180yc-fx3nexus_93180yc-ex-24Cisco NX-OS System Software in ACI Mode
CWE ID-CWE-233
Improper Handling of Parameters
CVE-2013-1202
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.39% / 59.17%
||
7 Day CHG~0.00%
Published-07 Feb, 2020 | 13:37
Updated-15 Nov, 2024 | 17:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco ACE A2(3.6) allows log retention DoS.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ace_application_control_engine_module_a2Cisco ACE
CVE-2012-0381
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-3.52% / 87.16%
||
7 Day CHG~0.00%
Published-29 Mar, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.2 and IOS XE 2.1.x through 2.6.x and 3.1.xS through 3.4.xS before 3.4.2S, 3.5.xS before 3.5.1S, and 3.2.xSG before 3.2.2SG allows remote attackers to cause a denial of service (device reload) by sending IKE UDP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCts38429.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xen/a
CVE-2004-0079
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.27% / 83.99%
||
7 Day CHG~0.00%
Published-18 Mar, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.

Action-Not Available
Vendor-sco4dlitebluecoatneoterisstonesofttarantellasecurecomputingn/aAvaya LLCNovellSun Microsystems (Oracle Corporation)Symantec CorporationCisco Systems, Inc.Apple Inc.HP Inc.Check Point Software Technologies Ltd.Silicon Graphics, Inc.OpenBSDRed Hat, Inc.Dell Inc.FreeBSD FoundationOpenSSLVMware (Broadcom Inc.)
Product-wbemfirewall_services_moduleapplication_and_content_networking_softwareaaa_servers8700okena_stormwatchmac_os_xthreat_responseapache-based_web_serverpix_firewallpropacks8500provider-1call_managerciscoworks_common_management_foundationclientless_vpn_gateway_4400secure_content_acceleratorvsus8300stonebeat_fullclustergsx_serverfirewall-1access_registrarstonebeat_securityclustergss_4480_global_site_selectortarantella_enterprisestonegate_vpn_clientproxysgvpn-1mac_os_x_serverenterprise_linux_desktopmds_9000enterprise_linuxwebstaropenserverbsafe_ssl-jioswebnssg203css11000_content_services_switchopenssllinuxintuity_audixserverclustersg5openbsdsg208sg200cacheos_ca_sastonegateciscoworks_common_servicesgss_4490_global_site_selectorimanagerinstant_virtual_extranetedirectorysidewinderhp-uxconverged_communications_serverstonebeat_webclustercrypto_accelerator_4000speed_technologies_litespeed_web_serverfreebsdpix_firewall_softwarecontent_services_switch_11500css_secure_content_acceleratorn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2020-3306
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.23% / 46.01%
||
7 Day CHG~0.00%
Published-06 May, 2020 | 16:42
Updated-15 Nov, 2024 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software DHCP Denial of Service Vulnerability

A vulnerability in the DHCP module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to incorrect processing of certain DHCP packets. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asa_5550adaptive_security_applianceasa_5505adaptive_security_appliance_softwareasa_5555-xasa_5520asa_5510asa_5525-xasa_5580asa_5585-xasa_5512-xfirepower_threat_defenseasa_5515-xCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-3123
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-4.89% / 89.18%
||
7 Day CHG~0.00%
Published-05 Feb, 2020 | 17:30
Updated-15 Nov, 2024 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.

Action-Not Available
Vendor-Canonical Ltd.ClamAVCisco Systems, Inc.
Product-ubuntu_linuxclamavClamAV
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-3272
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.36% / 57.30%
||
7 Day CHG~0.00%
Published-22 May, 2020 | 05:15
Updated-15 Nov, 2024 | 17:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Prime Network Registrar DHCP Denial of Service Vulnerability

A vulnerability in the DHCP server of Cisco Prime Network Registrar could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation of incoming DHCP traffic. An attacker could exploit this vulnerability by sending a crafted DHCP request to an affected device. A successful exploit could allow the attacker to cause a restart of the DHCP server process, causing a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_network_registrarCisco Prime Network Registrar
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found