CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-20744
In vcu, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519200.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.769Z
2023-06-06T12:11:39.255Z
2023-06-06T12:11:39.255Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6789, MT6855, MT8185, MT8195, MT8365, MT8395, MT8781, MT8786, MT8789, MT8791, MT8797', 'Versions': 'Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2'}
CVE-2023-20894
The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.
https://www.vmware.com/security/advisories/VMSA-2023-0014.html
2022-11-01T15:41:50.395Z
2023-06-22T11:54:04.383Z
2023-06-22T11:54:04.383Z
{'Vendor': 'VMware', 'Product': 'VMware vCenter Server (vCenter Server)', 'Versions': '8.0, 7.0'}
CVE-2023-20197
A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee
2022-10-27T18:47:50.365Z
2023-08-16T21:43:11.287Z
2024-01-25T16:57:55.562Z
{'Vendor': 'Cisco', 'Product': 'Cisco Secure Endpoint', 'Versions': '6.0.9, 6.0.7, 6.1.5, 6.1.7, 6.1.9, 6.2.1, 6.2.5, 6.2.19, 6.2.9, 6.3.5, 6.3.1, 6.3.7, 6.3.3, 7.0.5, 7.1.1, 7.1.5, 1.12.1, 1.12.2, 1.12.5, 1.12.0, 1.12.6, 1.12.3, 1.12.7, 1.12.4, 1.13.0, 1.13.1, 1.13.2, 1.11.0, 1.10.2, 1.10.1, 1.10.0, 1.14.0, 1.6.0, 1.9.0, 1.9.1, 1.8.1, 1.8.0, 1.8.4, 1.7.0, 7.2.13, 7.2.7, 7.2.3, 7.2.11, 7.2.5, 7.3.3, 7.3.5, 8.1.5'}
CVE-2023-20178
A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established. This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-csc-privesc-wx4U4Kw
2022-10-27T00:00:00
2023-06-28T00:00:00
2024-01-25T16:57:50.608Z
{'Vendor': 'Cisco', 'Product': 'Cisco Secure Client', 'Versions': '4.9.00086, 4.9.01095, 4.9.02028, 4.9.03047, 4.9.03049, 4.9.04043, 4.9.04053, 4.9.05042, 4.9.06037, 4.10.00093, 4.10.01075, 4.10.02086, 4.10.03104, 4.10.04065, 4.10.04071, 4.10.05085, 4.10.05095, 4.10.05111, 4.10.06079, 4.10.06090, 5.0.00238, 5.0.00529, 5.0.00556, 5.0.01242'}
CVE-2023-20528
Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032
2022-10-27T18:53:39.738Z
2023-01-10T20:57:03.392Z
2023-01-11T07:01:59.843980Z
{'Vendor': ' AMD', 'Product': '2nd Gen EPYC', 'Versions': 'various '}
CVE-2023-20247
A vulnerability in the remote access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to bypass a configured multiple certificate authentication policy and connect using only a valid username and password. This vulnerability is due to improper error handling during remote access VPN authentication. An attacker could exploit this vulnerability by sending crafted requests during remote access VPN session establishment. A successful exploit could allow the attacker to bypass the configured multiple certificate authentication policy while retaining the privileges and permissions associated with the original connection profile.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-multi-cert-dzA3h5PT
2022-10-27T18:47:50.371Z
2023-11-01T17:14:57.660Z
2024-01-25T16:58:31.488Z
{'Vendor': 'Cisco', 'Product': 'Cisco Adaptive Security Appliance (ASA) Software', 'Versions': '9.8.1, 9.8.1.5, 9.8.1.7, 9.8.2, 9.8.2.8, 9.8.2.14, 9.8.2.15, 9.8.2.17, 9.8.2.20, 9.8.2.24, 9.8.2.26, 9.8.2.28, 9.8.2.33, 9.8.2.35, 9.8.2.38, 9.8.3.8, 9.8.3.11, 9.8.3.14, 9.8.3.16, 9.8.3.18, 9.8.3.21, 9.8.3, 9.8.3.26, 9.8.3.29, 9.8.4, 9.8.4.3, 9.8.4.7, 9.8.4.8, 9.8.4.10, 9.8.4.12, 9.8.4.15, 9.8.4.17, 9.8.4.25, 9.8.4.20, 9.8.4.22, 9.8.4.26, 9.8.4.29, 9.8.4.32, 9.8.4.33, 9.8.4.34, 9.8.4.35, 9.8.4.39, 9.8.4.40, 9.8.4.41, 9.8.4.43, 9.8.4.44, 9.8.4.45, 9.8.4.46, 9.8.4.48, 9.12.1, 9.12.1.2, 9.12.1.3, 9.12.2, 9.12.2.4, 9.12.2.5, 9.12.2.9, 9.12.3, 9.12.3.2, 9.12.3.7, 9.12.4, 9.12.3.12, 9.12.3.9, 9.12.2.1, 9.12.4.2, 9.12.4.4, 9.12.4.7, 9.12.4.10, 9.12.4.13, 9.12.4.8, 9.12.4.18, 9.12.4.24, 9.12.4.26, 9.12.4.29, 9.12.4.30, 9.12.4.35, 9.12.4.37, 9.12.4.38, 9.12.4.39, 9.12.4.40, 9.12.4.41, 9.12.4.47, 9.12.4.48, 9.12.4.50, 9.12.4.52, 9.12.4.54, 9.12.4.55, 9.12.4.56, 9.12.4.58, 9.14.1, 9.14.1.10, 9.14.1.6, 9.14.1.15, 9.14.1.19, 9.14.1.30, 9.14.2, 9.14.2.4, 9.14.2.8, 9.14.2.13, 9.14.2.15, 9.14.3, 9.14.3.1, 9.14.3.9, 9.14.3.11, 9.14.3.13, 9.14.3.18, 9.14.3.15, 9.14.4, 9.14.4.6, 9.14.4.7, 9.14.4.12, 9.14.4.13, 9.14.4.14, 9.14.4.15, 9.14.4.17, 9.14.4.22, 9.14.4.23, 9.15.1, 9.15.1.7, 9.15.1.10, 9.15.1.15, 9.15.1.16, 9.15.1.17, 9.15.1.1, 9.15.1.21, 9.16.1, 9.16.1.28, 9.16.2, 9.16.2.3, 9.16.2.7, 9.16.2.11, 9.16.2.13, 9.16.2.14, 9.16.3, 9.16.3.3, 9.16.3.14, 9.16.3.15, 9.16.3.19, 9.16.3.23, 9.16.4, 9.16.4.9, 9.16.4.14, 9.16.4.18, 9.16.4.19, 9.17.1, 9.17.1.7, 9.17.1.9, 9.17.1.10, 9.17.1.11, 9.17.1.13, 9.17.1.15, 9.17.1.20, 9.17.1.30, 9.18.1, 9.18.1.3, 9.18.2, 9.18.2.5, 9.18.2.7, 9.18.2.8, 9.18.3, 9.18.3.39, 9.18.3.46, 9.19.1, 9.19.1.5, 9.19.1.9, 9.19.1.12'}
CVE-2023-20752
In keymange, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826586; Issue ID: ALPS07826586.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.770Z
2023-06-06T12:11:53.101Z
2023-06-06T12:11:53.101Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT8167, MT8167S, MT8168, MT8175, MT8195, MT8362A, MT8365', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20181
A vulnerability in the web-based management interface of Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to conduct XSS attacks. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-web-multi-7kvPmu2F
2022-10-27T18:47:50.364Z
2023-08-03T21:22:47.480Z
2024-01-25T16:57:51.566Z
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business IP Phones', 'Versions': '7.6.0, 7.6.2, 7.6.2SR3, 7.6.2SR6, 7.6.2SR2, 7.6.2SR4, 7.6.2SR1, 7.6.2SR5, 7.6.2SR7, 7.6.1, 7.3.7, 7.5.5, 7.5.6(XU), 7.5.2, 7.5.2a, 7.5.7, 7.5.3, 7.5.6, 7.5.2b, 7.5.6c, 7.5.6a, 7.5.7s, 7.5.1, 7.5.5a, 7.5.5b, 7.5.4, 7.4.7, 7.4.4, 7.4.8, 7.4.3, 7.4.9, 7.4.6'}
CVE-2023-20882
In Cloud foundry routing release versions from 0.262.0 and prior to 0.266.0,a bug in the gorouter process can lead to a denial of service of applications hosted on Cloud Foundry. Under the right circumstances, when client connections are closed prematurely, gorouter marks the currently selected backend as failed and removes it from the routing pool.
https://www.cloudfoundry.org/blog/cve-2023-20882-gorouter-pruning-via-client-disconnect-resulting-in-dos/
2022-11-01T00:00:00
2023-05-26T00:00:00
2023-05-26T00:00:00
{'Vendor': 'n/a', 'Product': 'Cloud Foundry Routing release', 'Versions': 'Routing release versions from 0.262.0 and prior to 0.266.0'}
CVE-2023-20928
In binder_vma_close of binder.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-254837884References: Upstream kernel
https://source.android.com/security/bulletin/2023-01-01
2022-11-03T00:00:00
2023-01-24T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-20640
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629573; Issue ID: ALPS07629573.
https://corp.mediatek.com/product-security-bulletin/March-2023
2022-10-28T00:00:00
2023-03-07T00:00:00
2023-05-09T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6879, MT6895, MT6983, MT8791, MT8791T, MT8797', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20210
A vulnerability in Cisco BroadWorks could allow an authenticated, local attacker to elevate privileges to the root user on an affected device. The vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing a crafted command to the affected system. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, an attacker must have valid BroadWorks administrative privileges on the affected device.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-privesc-yw4ekrXW
2022-10-27T18:47:50.367Z
2023-07-12T13:53:38.359Z
2024-01-25T16:58:09.574Z
{'Vendor': 'Cisco', 'Product': 'Cisco BroadWorks', 'Versions': '24.0 ap375672, 24.0 ap375655, 24.0 ap376979, 24.0 ap379112, 24.0 ap379588, 24.0 ap378485, 24.0 ap376934, 24.0 ap379533, 24.0 ap374230, 24.0 ap378382, 24.0 ap375720, 24.0 ap378575, 24.0 ap378248, 24.0 ap378990, 24.0 ap378425, 24.0 ap377319, 24.0 ap378818, 24.0 ap375453, 24.0 ap376317, 24.0 ap376677, 24.0 ap375688, 24.0 ap377147, 24.0 ap376945, 24.0 ap377517, 24.0 ap376205, 24.0 ap378257, 24.0 ap378471, 24.0 ap376669, 24.0 ap375756, 24.0 ap378440, 24.0 ap376486, 24.0 ap378920, 24.0 ap375734, 24.0 ap378144, 24.0 ap375036, 24.0 ap375624, 24.0 ap378882, 24.0 ap376531, 24.0 ap375804, 24.0 ap376137, 24.0 ap377378, 24.0 ap376844, 24.0 ap376696, 24.0 ap378599, 24.0 ap378880, 24.0 ap374530, 24.0 ap375369, 24.0 ap376147, 24.0 ap376140, 24.0 ap379501, 24.0 ap378150, 24.0 ap375100, 24.0 ap376622, 24.0 ap379339, 24.0 ap377163, 24.0 ap375464, 24.0 ap376023, 24.0 ap378164, 24.0 ap378154, 24.0 ap377068, 24.0 ap377177, 24.0 ap377091, 24.0 ap377515, 24.0 ap379190, 24.0 ap378595, 24.0 ap374832, 24.0 ap367206, 24.0 ap377868, 24.0 ap378902, 24.0 ap375210, 24.0 ap375353, 24.0 ap376098, 24.0 ap378383, 24.0 ap379122, 24.0 ap376710, 24.0 ap376602, 24.0 ap378535, 24.0 ap377729, 24.0 ap375990, 24.0 ap375748, 24.0 ap376935, 24.0 ap376426, 24.0 ap375743, 24.0 ap379109, 24.0 ap378080, 24.0 ap375449, 24.0 ap375922, 24.0 ap377984, 24.0 ap379391, 24.0 ap379378, 24.0 ap376512, 24.0 ap376956, 24.0 ap369855, 24.0 ap379098, 24.0 ap376736, 24.0 ap377674, 24.0 ap375625, 24.0 ap378393, 24.0 ap376620, 24.0 ap372799, 24.0 ap378976, 24.0 ap376989, 24.0 ap378862, 24.0 ap378242, 24.0 ap375489, 24.0 ap379475, 24.0 ap376820, 24.0 ap375533, 24.0 ap376308, 24.0 ap376798, 24.0 ap375661, 24.0 ap378953, 24.0 ap371233, 24.0 ap377628, 24.0 ap375266, 24.0 ap376984, 24.0 ap375021, 24.0 ap377966, 24.0 ap375484, 24.0 ap378436, 24.0 ap378886, 24.0 ap375709, 24.0 ap376267, 24.0 ap375514, 24.0 ap377743, 24.0 ap377878, 24.0 ap378308, 24.0 ap379487, 24.0 ap376038, 24.0 ap377802, 24.0 ap376507, 24.0 ap377630, 24.0 ap378913, 24.0 ap376252, 24.0 ap376407, 24.0 ap376410, 24.0 ap376523, 24.0 ap375342, 24.0 ap375304, 24.0 ap378553, 24.0 ap375205, 24.0 ap376889, 24.0 ap376529, 24.0 ap375214, 24.0 ap377888, 24.0 ap377913, 24.0 ap376024, 24.0 ap378390, 24.0 ap375382, 24.0 ap379395, 24.0 ap377120, 24.0 ap378400, 24.0 ap376878, 24.0 ap377723, 24.0 ap374691, 24.0 ap379346, 24.0 ap378218, 24.0 ap376842, 24.0 ap374270, 24.0 ap376000, 24.0 ap376702, 24.0 ap377497, 24.0 ap375018, 24.0 ap378506, 24.0 ap377412, 24.0 ap375959, 24.0 ap379016, 24.0 ap379438, 24.0 ap378995, 24.0 ap378258, 24.0 ap378574, 24.0 ap375711, 24.0 ap376809, 24.0 ap375634, 24.0 ap375646, 24.0 ap375488, 24.0 ap377555, 24.0 ap375293, 24.0 ap378322, 24.0 ap378029, 24.0 ap379373, 24.0 ap377737, 24.0 ap378010, 24.0 ap378481, 24.0 ap376721, 24.0 ap375860, 24.0 ap378332, 24.0 ap379389, 24.0 ap377983, 24.0 ap378866, 24.0 ap377399, 24.0 ap376722, 24.0 ap379474, 24.0 ap378070, 24.0 ap376670, 24.0 ap375207, 24.0 ap376100, 24.0 ap378122, 24.0 ap376012, 24.0 ap375828, 24.0 ap378827, 24.0 ap376787, 24.0 ap376414, 24.0 ap377786, 24.0 ap376485, 24.0 ap379069, 24.0 ap378863, 24.0 ap376298, 24.0 ap373564, 24.0 ap376429, 24.0 ap379449, 24.0 ap377485, 24.0 ap378051, 24.0 ap375849, 24.0 ap376099, 24.0 ap378234, 24.0 ap377033, 24.0 ap377079, 24.0 ap375950, 24.0 ap375412, 24.0 ap375757, 24.0 ap376762, 24.0 ap376445, 24.0 ap379515, 24.0 ap375351, 24.0 ap375273, 24.0 ap378896, 24.0 ap379199, 24.0 ap374803, 24.0 ap375685, 24.0 ap375270, 24.0 ap370326, 24.0 ap375603, 24.0 ap376802, 24.0 ap376704, 24.0 ap379423, 24.0 ap376001, 24.0 ap377508, 24.0 ap375989, 24.0 ap376699, 24.0 ap377012, 24.0 ap379532, 24.0 ap378141, 24.0 ap375949, 24.0 ap375996, 24.0 ap378087, 24.0 ap378178, 24.0 ap375862, 24.0 ap376042, 24.0 ap378079, 24.0 ap379390, 24.0 ap378970, 24.0 ap375908, 24.0 ap378019, 24.0 ap377329, 24.0 ap376356, 24.0 ap377908, 24.0 ap377751, 24.0 ap377581, 24.0 ap375902, 24.0, 24.0 ap356141, 24.0 ap358290, 24.0 ap362693, 24.0 ap370935, 24.0 ap372508, 24.0 ap372932, 24.0 ap375289, 24.0 ap375291, 24.0 ap375317, 24.0 ap375370, 24.0 ap375398, 24.0 ap375409, 24.0 ap375430, 24.0 ap375432, 24.0 ap375465, 24.0 ap375466, 24.0 ap375469, 24.0 ap375502, 24.0 ap375518, 24.0 ap375522, 24.0 ap375539, 24.0 ap375785, 24.0 ap375920, 24.0 ap376156, 24.0 ap376189, 24.0 ap376213, 24.0 ap376218, 24.0 ap376340, 24.0 ap376384, 24.0 ap376541, 24.0 ap376652, 24.0 ap376666, 24.0 ap376668, 24.0 ap376682, 24.0 ap376689, 24.0 ap376695, 24.0 ap376752, 24.0 ap376818, 24.0 ap376873, 24.0 ap377023, 24.0 ap377037, 24.0 ap377050, 24.0 ap377175, 24.0 ap377229, 24.0 ap377384, 24.0 ap377423, 24.0 ap377496, 24.0 ap377516, 24.0 ap377538, 24.0 ap377569, 24.0 ap377651, 24.0 ap377687, 24.0 ap377718, 24.0 ap377727, 24.0 ap377757, 24.0 ap377779, 24.0 ap377792, 24.0 ap377799, 24.0 ap378014, 24.0 ap378119, 24.0 ap378140, 24.0 ap378142, 24.0 ap378153, 24.0 ap378165, 24.0 ap378168, 24.0 ap378227, 24.0 ap378259, 24.0 ap378372, 24.0 ap378415, 24.0 ap378419, 24.0 ap378437, 24.0 ap378509, 24.0 ap378545, 24.0 ap378581, 24.0 ap378585, 24.0 ap378823, 24.0 ap378904, 24.0 ap378952, 24.0 ap378966, 24.0 ap378987, 24.0 ap379080, 24.0 ap379085, 24.0 ap379091, 24.0 ap379140, 24.0 ap379152, 24.0 ap379167, 24.0 ap379168, 24.0 ap379187, 24.0 ap379331, 24.0 ap379411, 24.0 ap379427, 24.0 ap379482, 24.0 ap379531, 24.0 ap379535, 24.0 ap379565, 24.0 ap379587, 24.0 ap379600, 24.0 ap379606, 24.0 ap379608, 24.0 ap379611, 24.0 ap379616, 24.0 ap379627, 24.0 ap379635, 24.0 ap379694, 24.0 ap379701, 24.0 ap379752, 24.0 ap379760, 24.0 ap379762, 24.0 ap379764, 24.0 ap379780, 24.0 ap379781, 24.0 ap379782, 24.0 ap379830, 24.0 ap379839, 24.0 ap379848, 24.0 ap379855, 24.0 ap379874, 24.0 ap379884, 24.0 ap379889, 24.0 ap379892, 24.0 ap379903, 24.0 ap378203, 24.0 ap379008, 24.0 ap379795, 24.0 ap379838, 24.0 ap379847, 24.0 ap379890, 24.0 ap379921, 24.0 ap379925, 24.0 ap379934, 24.0 ap379957, 24.0 ap379963, 24.0 ap379972, 24.0 ap380059, 24.0 ap380099, 24.0 ap380109, 24.0 ap380137, 24.0 ap380143, 24.0 ap380161, 24.0 ap380176, 24.0 ap380180, 24.0 ap380181, 24.0 ap380187, 24.0 ap380196, 24.0 ap380204, 24.0 ap380239, 24.0 ap380249, 24.0 ap380256, 24.0 ap380264, 24.0 ap380269, 24.0 ap380270, 24.0 ap380281, 24.0 ap380282, 24.0 ap380355, 24.0 ap380371, 24.0 ap380375, 24.0 ap380396, 24.0 ap380450, 24.0 ap380465, 24.0 ap380473, 24.0 ap380501, 24.0 ap380506, 24.0 ap380543, 24.0 ap380581, 24.0 ap380595, 24.0 ap380637, 24.0 ap380692, 24.0 ap380758, 24.0 ap380762, 24.0 ap380766, 24.0 ap381358, 24.0 ap382200, 24.0 ap381767, 24.0 ap382744, 24.0 ap381657, 24.0 ap381609, 24.0 ap382951, 24.0 ap381848, 24.0 ap380849, 24.0 ap381809, 24.0 ap381826, 24.0 ap381622, 24.0 ap381654, 24.0 ap374211, 24.0 ap381002, 24.0 ap382750, 24.0 ap382039, 24.0 ap381874, 24.0 ap383534, 24.0 ap381775, 24.0 ap382916, 24.0 ap380939, 24.0 ap383002, 24.0 ap382206, 24.0 ap381247, 24.0 ap381666, 24.0 ap381825, 24.0 ap381952, 24.0 ap382277, 24.0 ap380936, 24.0 ap380985, 24.0 ap382468, 24.0 ap382094, 24.0 ap381971, 24.0 ap383536, 24.0 ap381970, 24.0 ap381271, 24.0 ap381292, 24.0 ap381621, 24.0 ap379049, 24.0 ap380840, 24.0 ap381600, 24.0 ap382526, 24.0 ap382462, 24.0 ap380613, 24.0 ap381596, 24.0 ap380779, 24.0 ap382615, 24.0 ap382170, 24.0 ap382164, 24.0 ap382189, 24.0 ap381357, 24.0 ap381348, 24.0 ap382495, 24.0 ap382042, 24.0 ap382441, 24.0 ap381575, 24.0 ap381936, 24.0 ap382994, 24.0 ap381623, 24.0 ap382236, 24.0 ap382676, 24.0 ap382673, 24.0 ap380998, 24.0 ap382045, 24.0 ap382167, 24.0 ap381975, 24.0 ap382668, 24.0 ap382053, 24.0 ap383710, 24.0 ap382740, 24.0 ap383459, 24.0 ap382692, 24.0 ap383737, 24.0 ap380045, 24.0 ap382195, 24.0 ap382057, 24.0 ap381243, 24.0 ap382160, 24.0 ap382445, 24.0 ap382246, 24.0 ap382958, 24.0 ap381854, 24.0 ap381604, 24.0 ap381091, 24.0 ap381079, 24.0 ap381527, 24.0 ap383772, 24.0 ap381004, 24.0 ap380737, 24.0 ap382253, 24.0 ap381721, 24.0 ap381322, 24.0 ap382098, 24.0 ap382677, 24.0 ap382169, 24.0 ap383696, 24.0 ap382258, 24.0 ap380751, 24.0 ap382262, 24.0 ap382267, 24.0 ap382192, 24.0 ap380128, 24.0 ap382656, 24.0 ap383779, 24.0 ap382194, 24.0 ap382691, 24.0 ap382372, 24.0 ap380771, 24.0 ap382155, 24.0 ap382484, 24.0 ap383902, 24.0 ap382362, 24.0 ap383788, 24.0 ap383771, 24.0 ap382836, 24.0 ap382240, 24.0 ap383700, 24.0 ap383597, 24.0 ap381108, 24.0 ap379012, 24.0 ap382709, 24.0 ap381078, 24.0 ap383505, 24.0 ap382977, 24.0 ap382912, 24.0 ap383569, 24.0 ap383105, 24.0 ap380537, 24.0 ap382935, 24.0 ap381616, 24.0 ap383519, 24.0 ap381410, 24.0 ap383573, 24.0 ap382959, 24.0 ap376010, 24.0 ap380051, 24.0 ap381506, 24.0 ap381732, 24.0 ap383492, 24.0 ap383089, 24.0 ap383172, 24.0 ap381624, 24.0 ap383547, 24.0 ap381584, 24.0 ap382945, 24.0 ap382594, 24.0 ap383494, 24.0 ap381611, 24.0 ap380739, 24.0 ap381574, 24.0 ap383390, 24.0 ap383538, 24.0 ap382838, 24.0 ap382252, 24.0 ap383518, 24.0 ap383326, 24.0 ap383463, 24.0 ap383391, 24.0 ap380052, 24.0 ap383352, 24.0 ap383064, 24.0 ap382488, 24.0 ap381615, 24.0 ap382952, 24.0 ap381055, 24.0 ap383466, 24.0 ap383178, 24.0 ap383515, 24.0 ap383681, 24.0 ap383377, 24.0 ap383327, 24.0 ap383123, 24.0 ap383346, 24.0 ap383331, 24.0 ap382993, 24.0 ap383147, 24.0 ap382487, 24.0 ap383170, 24.0 ap382929, 24.0 ap383717, 24.0 ap380782, 24.0 ap382954, 24.0 ap382527, 24.0 ap383754, 24.0 ap382969, 24.0 ap382965, 24.0 ap380970, 24.0 ap382515, 24.0 ap382463, 24.0 ap382976, 24.0 ap380837, 24.0 ap381878, 24.0 ap381031, 24.0 ap383338, 24.0 ap383119, 24.0 ap380802, 24.0 ap383168, 24.0 ap383297, 24.0 ap383188, 24.0 ap381285, 24.0 ap381257, 24.0 ap383247, 24.0 ap382186, 24.0 ap381418, 24.0 ap381515, 24.0 ap381570, 24.0 ap383511, 24.0 ap381367, 24.0 ap378603, 24.0 ap381366, 24.0 ap382456, 24.0 ap381412, 24.0 ap383567, 24.0 ap381548, 24.0 ap379397, 24.0 ap381518, 24.0 ap381341, 24.0 ap381498, 24.0 ap381507, 24.0 ap381339, 24.0 ap383302, 24.0 ap381398, 24.0 ap380775, 24.0 ap381526, 24.0 ap383908, 24.0 ap383821, 24.0 ap383781, 24.0 ap381334, 24.0 ap382689, 24.0 ap381215, 24.0 ap382646, 24.0 ap382493, 24.0 ap382300, 24.0 ap381001, 24.0 ap380697, 24.0 ap382412, 24.0 ap381305, 24.0 ap381523, 24.0 ap380535, 24.0 ap381543, 24.0 ap381088, 24.0 ap382631, 24.0 ap379046, 24.0 ap380167, 24.0 ap381308, 24.0 ap381340, 24.0 ap380783, 24.0 ap383603, 24.0 ap381300, 24.0 ap381805, 24.0 ap381733, 24.0 ap381384, 24.0 ap373571, 24.0 ap380042, 24.0 ap381840, 24.0 ap381951, 24.0 ap382856, 24.0 ap383524, 24.0 ap380047, 24.0 ap381857, 24.0 ap383520, 24.0 ap381956, 24.0 ap381655, 24.0 ap381569, 24.0 ap379954, 24.0 ap383716, 24.0 ap383775, 24.0 ap383838, 24.0 ap383905, 24.0 ap383909, 24.0 ap383933, 24.0 ap383943, 24.0 ap383952, 24.0 ap383955, 24.0 ap383968, 24.0 ap383979, 24.0 ap384000, 24.0 ap384115, 24.0 ap383989, 24.0 ap384002, 24.0 ap383782, 24.0 ap383992, 24.0 ap383973, 24.0 ap383309, 24.0 ap383514, 24.0 ap383815, 24.0 ap383899, 24.0 ap383983, 24.0 ap383994, 24.0 ap383998, 24.0 ap384015, 24.0 ap384023, 24.0 ap384034, 24.0 ap384120, 24.0 ap384127, 24.0 ap384129, 24.0 ap384134, 24.0 ap384137, 24.0 ap384138, 24.0 ap384145, 24.0 ap384151, 24.0 ap384163, 24.0 ap384173, 24.0 ap384177, 24.0 ap384179, 24.0 ap384185, 24.0 ap384191, 24.0 ap384194, 24.0 ap384209, 24.0 ap384211, 24.0 ap384220, 24.0 ap384234, 24.0 ap384309, 24.0 ap384317, 24.0 ap381051, 24.0 ap381081, 24.0 ap382225, 24.0 ap382717, 24.0 ap382824, 24.0 ap382841, 24.0 ap382857, 24.0 ap382873, 24.0 ap382894, 24.0 ap384232, 24.0 ap384239, 24.0 ap384320, 24.0 ap384339, 24.0 ap384342, 24.0 ap384344, 24.0 ap384345, 24.0 ap384351, 24.0 ap384357, 24.0 ap384358, 24.0 ap384361, 24.0 ap384365, 24.0 ap384367, 24.0 ap384372, 24.0 ap384374, 24.0 ap384377, 24.0 ap384386, 24.0 ap384389, 24.0 ap384395, 24.0 ap384423, 24.0 ap384428, 24.0 ap384429, 24.0 ap384430, 24.0 ap384431, 24.0 ap384434, 24.0 ap384439, 24.0 ap384441, 24.0 ap384446, 24.0 ap384448, 24.0 ap384449, 24.0 ap384455, 24.0 ap384462, 24.0 ap384468, 24.0 ap384471, 24.0 ap384474, 24.0 ap384480, 24.0 ap384543, 24.0 ap384589, 24.0 ap384594, 24.0 ap384620, 24.0 ap384622, 24.0 ap384627, 24.0 ap384629, 24.0 ap384636, 24.0 ap384641, 24.0 ap384643, 24.0 ap384650, 24.0 ap375650, 24.0 ap384382, 24.0 ap384383, 24.0 ap384457, 24.0 ap384591, 24.0 ap384653, 24.0 ap384654, 24.0 ap384656, 24.0 ap384658, 24.0 ap384740, 24.0 ap384745, 24.0 ap384747, 24.0 ap384755, 24.0 ap384772, 24.0 ap384781, 24.0 ap384793, 24.0 ap384800, 24.0 ap384801, 24.0 ap384870, 24.0 ap384874, 24.0 ap384876, 24.0 ap384879, 24.0 ap384884, 24.0 ap384898, 24.0 ap384901, 24.0 ap384908, 24.0 ap384921, 24.0 ap384925, 24.0 ap384930, 24.0 ap384931, 24.0 ap384942, 24.0 ap384947, 24.0 ap384957, 24.0 ap384962, 24.0 ap385048, 24.0 ap385054, 24.0 ap385057, 24.0 ap385058, 24.0 ap385071, 24.0 ap385085, 24.0 ap385088, 24.0 ap385104, 24.0 ap385107, 24.0 ap385111, 24.0 ap385114, 24.0 ap385115, 24.0 ap385134, 24.0 ap385136, 24.0 ap385146, 24.0 ap385149, 24.0 ap385233, 24.0 ap385235, 24.0 ap385238, 24.0 ap385240, 24.0 ap385241, 24.0 ap385242, 24.0 ap385244, 24.0 ap385247, 24.0 ap385249, 24.0 ap385250, 24.0 ap385251, 24.0 ap385252, 24.0 ap385253, 24.0 ap385254, 24.0 ap385255, 24.0 ap385256, 24.0 ap385259, 24.0 ap385265, 23.0, 23.0 ap380204, 23.0 ap380281, 23.0 ap380355, 23.0 ap380375, 23.0 ap380391, 23.0 ap380396, 23.0 ap366748, 23.0 ap374310, 23.0 ap375293, 23.0 ap371233, 23.0 ap381051, 23.0 ap365558, 23.0 ap371527, 23.0 ap379795, 23.0 ap373098, 23.0 ap382864, 23.0 ap364705, 23.0 ap375539, 23.0 ap382358, 23.0 ap374143, 23.0 ap367292, 23.0 ap375289, 23.0 ap375624, 23.0 ap375317, 23.0 ap362261, 23.0 ap382281, 23.0 ap367434, 23.0 ap363641, 23.0 ap376661, 23.0 ap382262, 23.0 ap380691, 23.0 ap383569, 23.0 ap368179, 23.0 ap375601, 23.0 ap382206, 23.0 ap383829, 23.0 ap377319, 23.0 ap381081, 23.0 ap375218, 23.0 ap363869, 23.0 ap367895, 23.0 ap383902, 23.0 ap372017, 23.0 ap383519, 23.0 ap375345, 23.0 ap374085, 23.0 ap367488, 23.0 ap382236, 23.0 ap363192, 23.0 ap371974, 23.0 ap367223, 23.0 ap373017, 23.0 ap373752, 23.0 ap373882, 23.0 ap373861, 23.0 ap365531, 23.0 ap373870, 23.0 ap372929, 23.0 ap373952, 23.0 ap374037, 23.0 ap368214, 23.0 ap366264, 23.0 ap373769, 23.0 ap383779, 23.0 ap374583, 23.0 ap373009, 23.0 ap371300, 23.0 ap374125, 23.0 ap367985, 23.0 ap364367, 23.0 ap362578, 23.0 ap373871, 23.0 ap383785, 23.0 ap380766, 23.0 ap365598, 23.0 ap380849, 23.0 ap373912, 23.0 ap366334, 23.0 ap374421, 23.0 ap380692, 23.0 ap380758, 23.0 ap374305, 23.0 ap380771, 23.0 ap367992, 23.0 ap374055, 23.0 ap367547, 23.0 ap368000, 23.0 ap366366, 23.0 ap365227, 23.0 ap372015, 23.0 ap372012, 23.0 ap374668, 23.0 ap383788, 23.0 ap351263, 23.0 ap374715, 23.0 ap374691, 23.0 ap370792, 23.0 ap372548, 23.0 ap364467, 23.0 ap365701, 23.0 ap374255, 23.0 ap381357, 23.0 ap374311, 23.0 ap374162, 23.0 ap363644, 23.0 ap373754, 23.0 ap373301, 23.0 ap373182, 23.0 ap374226, 23.0 ap377423, 23.0 ap369489, 23.0 ap373294, 23.0 ap383524, 23.0 ap383302, 23.0 ap375902, 23.0 ap376010, 23.0 ap382487, 23.0 ap371314, 23.0 ap371327, 23.0 ap371285, 23.0 ap371368, 23.0 ap371167, 23.0 ap374454, 23.0 ap383538, 23.0 ap374109, 23.0 ap374639, 23.0 ap371099, 23.0 ap369731, 23.0 ap371310, 23.0 ap383490, 23.0 ap374315, 23.0 ap374249, 23.0 ap374493, 23.0 ap374165, 23.0 ap374361, 23.0 ap373330, 23.0 ap369928, 23.0 ap374296, 23.0 ap371319, 23.0 ap374210, 23.0 ap372116, 23.0 ap371748, 23.0 ap374472, 23.0 ap372453, 23.0 ap371432, 23.0 ap372345, 23.0 ap371868, 23.0 ap372121, 23.0 ap383710, 23.0 ap373151, 23.0 ap372995, 23.0 ap373511, 23.0 ap372873, 23.0 ap370427, 23.0 ap371209, 23.0 ap355298, 23.0 ap371811, 23.0 ap373589, 23.0 ap366525, 23.0 ap381596, 23.0 ap383567, 23.0 ap372533, 23.0 ap372922, 23.0 ap370538, 23.0 ap371268, 23.0 ap383681, 23.0 ap374498, 23.0 ap373004, 23.0 ap371269, 23.0 ap371456, 23.0 ap366201, 23.0 ap360464, 23.0 ap362035, 23.0 ap375383, 23.0 ap375770, 23.0 ap372607, 23.0 ap371259, 23.0 ap374794, 23.0 ap366296, 23.0 ap374892, 23.0 ap367007, 23.0 ap365754, 23.0 ap374785, 23.0 ap352402, 23.0 ap372079, 23.0 ap375309, 23.0 ap366797, 23.0 ap366335, 23.0 ap375465, 23.0 ap374609, 23.0 ap381366, 23.0 ap370383, 23.0 ap371722, 23.0 ap362749, 23.0 ap367323, 23.0 ap375435, 23.0 ap374820, 23.0 ap369763, 23.0 ap381657, 23.0 ap368517, 23.0 ap372455, 23.0 ap365058, 23.0 ap370362, 23.0 ap381358, 23.0 ap374723, 23.0 ap375353, 23.0 ap375370, 23.0 ap380201, 23.0 ap380041, 23.0 ap361414, 23.0 ap380507, 23.0 ap368643, 23.0 ap379140, 23.0 ap379461, 23.0 ap379501, 23.0 ap379201, 23.0 ap377147, 23.0 ap376261, 23.0 ap379417, 23.0 ap372207, 23.0 ap368743, 23.0 ap370464, 23.0 ap353137, 23.0 ap373016, 23.0 ap378864, 23.0 ap364518, 23.0 ap361651, 23.0 ap379339, 23.0 ap374711, 23.0 ap371091, 23.0 ap370763, 23.0 ap366610, 23.0 ap371021, 23.0 ap366275, 23.0 ap370909, 23.0 ap381243, 23.0 ap381271, 23.0 ap379449, 23.0 ap371052, 23.0 ap381247, 23.0 ap383603, 23.0 ap380249, 23.0 ap383560, 23.0 ap382195, 23.0 ap380130, 23.0 ap373571, 23.0 ap382668, 23.0 ap382493, 23.0 ap380269, 23.0 ap380232, 23.0 ap364371, 23.0 ap377483, 23.0 ap383716, 23.0 ap383775, 23.0 ap383909, 23.0 ap383913, 23.0 ap383943, 23.0 ap383952, 23.0 ap383955, 23.0 ap383979, 23.0 ap383838, 23.0 ap384023, 23.0 ap381781, 23.0 ap383717, 23.0 ap383797, 23.0 ap383815, 23.0 ap383998, 23.0 ap384015, 23.0 ap384127, 23.0 ap384131, 23.0 ap384151, 23.0 ap384173, 23.0 ap384179, 23.0 ap384185, 23.0 ap384211, 23.0 ap384220, 23.0 ap384227, 23.0 ap384245, 23.0 ap384344, 23.0 ap363366, 23.0 ap364258, 23.0 ap364844, 23.0 ap365170, 23.0 ap365576, 23.0 ap365858, 23.0 ap366221, 23.0 ap366294, 23.0 ap365801, 23.0 ap366170, 23.0 ap364925, 23.0 ap366295, 23.0 ap366346, 23.0 ap366348, 23.0 ap365171, 23.0 ap364295, 23.0 ap364559, 23.0 ap366118, 23.0 ap366252, 23.0 ap363815, 23.0 ap363729, 23.0 ap365390, 23.0 ap364932, 23.0 ap365239, 23.0 ap365759, 23.0 ap366211, 23.0 ap366290, 23.0 ap365223, 23.0 ap366117, 23.0 ap365730, 23.0 ap366299, 23.0 ap366261, 23.0 ap365889, 23.0 ap366181, 23.0 ap365115, 23.0 ap364048, 23.0 ap366298, 23.0 ap364699, 23.0 ap345032, 23.0 ap362683, 23.0 ap363361, 23.0 ap352969, 23.0 ap359103, 23.0 ap366375, 23.0 ap366870, 23.0 ap366912, 23.0 ap366624, 23.0 ap367109, 23.0 ap366397, 23.0 ap354354, 23.0 ap349850, 23.0 ap366880, 23.0 ap360007, 23.0 ap366744, 23.0 ap366747, 23.0 ap366656, 23.0 ap367206, 23.0 ap362771, 23.0 ap367291, 23.0 ap366916, 23.0 ap367207, 23.0 ap363363, 23.0 ap366959, 23.0 ap351530, 23.0 ap361116, 23.0 ap366898, 23.0 ap357608, 23.0 ap361533, 23.0 ap366827, 23.0 ap352962, 23.0 ap366412, 23.0 ap369295, 23.0 ap366358, 23.0 ap366677, 23.0 ap366882, 23.0 ap366972, 23.0 ap366486, 23.0 ap366803, 23.0 ap358290, 23.0 ap363265, 23.0 ap363128, 23.0 ap366701, 23.0 ap366373, 23.0 ap369674, 23.0 ap369206, 23.0 ap369065, 23.0 ap368327, 23.0 ap368308, 23.0 ap368632, 23.0 ap367290, 23.0 ap369302, 23.0 ap368419, 23.0 ap369501, 23.0 ap369219, 23.0 ap368601, 23.0 ap368604, 23.0 ap368706, 23.0 ap368461, 23.0 ap368612, 23.0 ap368552, 23.0 ap369529, 23.0 ap369748, 23.0 ap368218, 23.0 ap368913, 23.0 ap369607, 23.0 ap369693, 23.0 ap368957, 23.0 ap368510, 23.0 ap368445, 23.0 ap369106, 23.0 ap369257, 23.0 ap368987, 23.0 ap369150, 23.0 ap368695, 23.0 ap368167, 23.0 ap370361, 23.0 ap367969, 23.0 ap367367, 23.0 ap369434, 23.0 ap369132, 23.0 ap367678, 23.0 ap367517, 23.0 ap369863, 23.0 ap369227, 23.0 ap368970, 23.0 ap369454, 23.0 ap367332, 23.0 ap368067, 23.0 ap369641, 23.0 ap367794, 23.0 ap369934, 23.0 ap370196, 23.0 ap367358, 23.0 ap367453, 23.0 ap369881, 23.0 ap367732, 23.0 ap367294, 23.0 ap367646, 23.0 ap367874, 23.0 ap370344, 23.0 ap367524, 23.0 ap368153, 23.0 ap368087, 23.0 ap367820, 23.0 ap368180, 23.0 ap367726, 23.0 ap370103, 23.0 ap367974, 23.0 ap367396, 23.0 ap367340, 23.0 ap367293, 23.0 ap369855, 23.0 ap368140, 23.0 ap367298, 23.0 ap367998, 23.0 ap372337, 23.0 ap372706, 23.0 ap368032, 23.0 ap367906, 23.0 ap370138, 23.0 ap372380, 23.0 ap372246, 23.0 ap370193, 23.0 ap372643, 23.0 ap372560, 23.0 ap367513, 23.0 ap369931, 23.0 ap368195, 23.0 ap372243, 23.0 ap368216, 23.0 ap369929, 23.0 ap367365, 23.0 ap367782, 23.0 ap367675, 23.0 ap372757, 23.0 ap372389, 23.0 ap372799, 23.0 ap372641, 23.0 ap371050, 23.0 ap372338, 23.0 ap372623, 23.0 ap372422, 23.0 ap372033, 23.0 ap372178, 23.0 ap371516, 23.0 ap372351, 23.0 ap372708, 23.0 ap372100, 23.0 ap372504, 23.0 ap371961, 23.0 ap370590, 23.0 ap370544, 23.0 ap372599, 23.0 ap371610, 23.0 ap371836, 23.0 ap371343, 23.0 ap372674, 23.0 ap371202, 23.0 ap370911, 23.0 ap370817, 23.0 ap372043, 23.0 ap370802, 23.0 ap371725, 23.0 ap370437, 23.0 ap370926, 23.0 ap370884, 23.0 ap371681, 23.0 ap371366, 23.0 ap370952, 23.0 ap371281, 23.0 ap371436, 23.0 ap371153, 23.0 ap371033, 23.0 ap371977, 23.0 ap371627, 23.0 ap371155, 23.0 ap371134, 23.0 ap371295, 23.0 ap372152, 23.0 ap371760, 23.0 ap370627, 23.0 ap371583, 23.0 ap371546, 23.0 ap371770, 23.0 ap371437, 23.0 ap372091, 23.0 ap372163, 23.0 ap370737, 23.0 ap370908, 23.0 ap370465, 23.0 ap371587, 23.0 ap375133, 23.0 ap371682, 23.0 ap375266, 23.0 ap372099, 23.0 ap375254, 23.0 ap372016, 23.0 ap372177, 23.0 ap375242, 23.0 ap375206, 23.0 ap375291, 23.0 ap371775, 23.0 ap375196, 23.0 ap375688, 23.0 ap375382, 23.0 ap375634, 23.0 ap375654, 23.0 ap375449, 23.0 ap375321, 23.0 ap375685, 23.0 ap375509, 23.0 ap375719, 23.0 ap375720, 23.0 ap375464, 23.0 ap375625, 23.0 ap375441, 23.0 ap375709, 23.0 ap375343, 23.0 ap375533, 23.0 ap375672, 23.0 ap375545, 23.0 ap375264, 23.0 ap375661, 23.0 ap375646, 23.0 ap375238, 23.0 ap375304, 23.0 ap375097, 23.0 ap373664, 23.0 ap373562, 23.0 ap372932, 23.0 ap374339, 23.0 ap374265, 23.0 ap374230, 23.0 ap374430, 23.0 ap373102, 23.0 ap375655, 23.0 ap373777, 23.0 ap374113, 23.0 ap373015, 23.0 ap374971, 23.0 ap374803, 23.0 ap374677, 23.0 ap372974, 23.0 ap373117, 23.0 ap374312, 23.0 ap374354, 23.0 ap375018, 23.0 ap373018, 23.0 ap374506, 23.0 ap374588, 23.0 ap373950, 23.0 ap375038, 23.0 ap373480, 23.0 ap374238, 23.0 ap372845, 23.0 ap373564, 23.0 ap373482, 23.0 ap372994, 23.0 ap373137, 23.0 ap373108, 23.0 ap374977, 23.0 ap373034, 23.0 ap374324, 23.0 ap374031, 23.0 ap374093, 23.0 ap373732, 23.0 ap374507, 23.0 ap373684, 23.0 ap374356, 23.0 ap373820, 23.0 ap373104, 23.0 ap373954, 23.0 ap373644, 23.0 ap373899, 23.0 ap374822, 23.0 ap374254, 23.0 ap375069, 23.0 ap373918, 23.0 ap374557, 23.0 ap372854, 23.0 ap373647, 23.0 ap374838, 23.0 ap374330, 23.0 ap374799, 23.0 ap374428, 23.0 ap373008, 23.0 ap375936, 23.0 ap375862, 23.0 ap374994, 23.0 ap376041, 23.0 ap374895, 23.0 ap375793, 23.0 ap376088, 23.0 ap373046, 23.0 ap375937, 23.0 ap374680, 23.0 ap376181, 23.0 ap375797, 23.0 ap375003, 23.0 ap373763, 23.0 ap373539, 23.0 ap373111, 23.0 ap375734, 23.0 ap376117, 23.0 ap375743, 23.0 ap376087, 23.0 ap376179, 23.0 ap376100, 23.0 ap373299, 23.0 ap373303, 23.0 ap375908, 23.0 ap376356, 23.0 ap375984, 23.0 ap373318, 23.0 ap375865, 23.0 ap373196, 23.0 ap376038, 23.0 ap373257, 23.0 ap373285, 23.0 ap376218, 23.0 ap373438, 23.0 ap373212, 23.0 ap373391, 23.0 ap373315, 23.0 ap373271, 23.0 ap376509, 23.0 ap376252, 23.0 ap376602, 23.0 ap376752, 23.0 ap373452, 23.0 ap376429, 23.0 ap376860, 23.0 ap376710, 23.0 ap376410, 23.0 ap376577, 23.0 ap376633, 23.0 ap376298, 23.0 ap373189, 23.0 ap376426, 23.0 ap376873, 23.0 ap376668, 23.0 ap376407, 23.0 ap376670, 23.0 ap376485, 23.0 ap376642, 23.0 ap376652, 23.0 ap376523, 23.0 ap376656, 23.0 ap376620, 23.0 ap376531, 23.0 ap378025, 23.0 ap377412, 23.0 ap376504, 23.0 ap376762, 23.0 ap376541, 23.0 ap376671, 23.0 ap376844, 23.0 ap376701, 23.0 ap376614, 23.0 ap377578, 23.0 ap377496, 23.0 ap377715, 23.0 ap377508, 23.0 ap376416, 23.0 ap377409, 23.0 ap377778, 23.0 ap376355, 23.0 ap377866, 23.0 ap377516, 23.0 ap377644, 23.0 ap377755, 23.0 ap377540, 23.0 ap377497, 23.0 ap377523, 23.0 ap377581, 23.0 ap377727, 23.0 ap378436, 23.0 ap377515, 23.0 ap377674, 23.0 ap378400, 23.0 ap377566, 23.0 ap377494, 23.0 ap377799, 23.0 ap377779, 23.0 ap378165, 23.0 ap378332, 23.0 ap377757, 23.0 ap377908, 23.0 ap377802, 23.0 ap377999, 23.0 ap377984, 23.0 ap378134, 23.0 ap378545, 23.0 ap378863, 23.0 ap378882, 23.0 ap379016, 23.0 ap378599, 23.0 ap378218, 23.0 ap378164, 23.0 ap379085, 23.0 ap378880, 23.0 ap378334, 23.0 ap378862, 23.0 ap378425, 23.0 ap378259, 23.0 ap378970, 23.0 ap378153, 23.0 ap378585, 23.0 ap378509, 23.0 ap378393, 23.0 ap378079, 23.0 ap378404, 23.0 ap378471, 23.0 ap378966, 23.0 ap379049, 23.0 ap379012, 23.0 ap379080, 23.0 ap378865, 23.0 ap378140, 23.0 ap378574, 23.0 ap378440, 23.0 ap378055, 23.0 ap378823, 23.0 ap378603, 23.0 ap379397, 23.0 ap379153, 23.0 ap378953, 23.0 ap378866, 23.0 ap379008, 23.0 ap378924, 23.0 ap378581, 23.0 ap378999, 23.0 ap378161, 23.0 ap378080, 23.0 ap379493, 23.0 ap380161, 23.0 ap379046, 23.0 ap379874, 23.0 ap378391, 23.0 ap380239, 23.0 ap379951, 23.0 ap379772, 23.0 ap378419, 23.0 ap378257, 23.0 ap379775, 23.0 ap379838, 23.0 ap379531, 23.0 ap379888, 23.0 ap379167, 23.0 ap378485, 23.0 ap380167, 23.0 ap380099, 23.0 ap379847, 23.0 ap379098, 23.0 ap379972, 23.0 ap379438, 23.0 ap380143, 23.0 ap380187, 23.0 ap379326, 23.0 ap379427, 23.0 ap380045, 23.0 ap379848, 23.0 ap377384, 23.0 ap376984, 23.0 ap377042, 23.0 ap379890, 23.0 ap380128, 23.0 ap377149, 23.0 ap380446, 23.0 ap379694, 23.0 ap376988, 23.0 ap380270, 23.0 ap379780, 23.0 ap380371, 23.0 ap377225, 23.0 ap379752, 23.0 ap380137, 23.0 ap377045, 23.0 ap376989, 23.0 ap380180, 23.0 ap380042, 23.0 ap376935, 23.0 ap379487, 23.0 ap379934, 23.0 ap377023, 23.0 ap377327, 23.0 ap379833, 23.0 ap376953, 23.0 ap380473, 23.0 ap380535, 23.0 ap377068, 23.0 ap379853, 23.0 ap379350, 23.0 ap380998, 23.0 ap380626, 23.0 ap377079, 23.0 ap379151, 23.0 ap377329, 23.0 ap381091, 23.0 ap380751, 23.0 ap380543, 23.0 ap381270, 23.0 ap380817, 23.0 ap381055, 23.0 ap380506, 23.0 ap381275, 23.0 ap380739, 23.0 ap380783, 23.0 ap380970, 23.0 ap380537, 23.0 ap381140, 23.0 ap380697, 23.0 ap380936, 23.0 ap380486, 23.0 ap380512, 23.0 ap380737, 23.0 ap381118, 23.0 ap380555, 23.0 ap381072, 23.0 ap381584, 23.0 ap381088, 23.0 ap381137, 23.0 ap382053, 23.0 ap381523, 23.0 ap381732, 23.0 ap382372, 23.0 ap382252, 23.0 ap383002, 23.0 ap382857, 23.0 ap383512, 23.0 ap382846, 23.0 ap382253, 23.0 ap381322, 23.0 ap382057, 23.0 ap382386, 23.0 ap382709, 23.0 ap382954, 23.0 ap382505, 23.0 ap382225, 23.0 ap382717, 23.0 ap381840, 23.0 ap381594, 23.0 ap381410, 23.0 ap382463, 23.0 ap382198, 23.0 ap381526, 23.0 ap381498, 23.0 ap381418, 23.0 ap383573, 23.0 ap382838, 23.0 ap381609, 23.0 ap381548, 23.0 ap382409, 23.0 ap383706, 23.0 ap382945, 23.0 ap382300, 23.0 ap382615, 23.0 ap382977, 23.0 ap384345, 23.0 ap383547, 23.0 ap382158, 23.0 ap382240, 23.0 ap383515, 23.0 ap383754, 23.0 ap381961, 23.0 ap382526, 23.0 ap382951, 23.0 ap382824, 23.0 ap382993, 23.0 ap383536, 23.0 ap383247, 23.0 ap381504, 23.0 ap383170, 23.0 ap382032, 23.0 ap382992, 23.0 ap383594, 23.0 ap383365, 23.0 ap383772, 23.0 ap381569, 23.0 ap381348, 23.0 ap382192, 23.0 ap381367, 23.0 ap383352, 23.0 ap383597, 23.0 ap381622, 23.0 ap383518, 23.0 ap383492, 23.0 ap383309, 23.0 ap383064, 23.0 ap383168, 23.0 ap382362, 23.0 ap382251, 23.0 ap383319, 23.0 ap382434, 23.0 ap384431, 23.0 ap383514, 23.0 ap384441, 23.0 ap383994, 23.0 ap384034, 23.0 ap384120, 23.0 ap384134, 23.0 ap384191, 23.0 ap384234, 23.0 ap384309, 23.0 ap384317, 23.0 ap342846, 23.0 ap352264, 23.0 ap352954, 23.0 ap355907, 23.0 ap356141, 23.0 ap356752, 23.0 ap358046, 23.0 ap359922, 23.0 ap361443, 23.0 ap361930, 23.0 ap362693, 23.0 ap363247, 23.0 ap363431, 23.0 ap363672, 23.0 ap363710, 23.0 ap364519, 23.0 ap364532, 23.0 ap364634, 23.0 ap364753, 23.0 ap364956, 23.0 ap365040, 23.0 ap365155, 23.0 ap365646, 23.0 ap365661, 23.0 ap365689, 23.0 ap365744, 23.0 ap365770, 23.0 ap365773, 23.0 ap365798, 23.0 ap365886, 23.0 ap365900, 23.0 ap365946, 23.0 ap365979, 23.0 ap365983, 23.0 ap365984, 23.0 ap366120, 23.0 ap366247, 23.0 ap366395, 23.0 ap366398, 23.0 ap366411, 23.0 ap366443, 23.0 ap366661, 23.0 ap366684, 23.0 ap366835, 23.0 ap366836, 23.0 ap366842, 23.0 ap366879, 23.0 ap366905, 23.0 ap366940, 23.0 ap366967, 23.0 ap366968, 23.0 ap366982, 23.0 ap366984, 23.0 ap366986, 23.0 ap367006, 23.0 ap367014, 23.0 ap367112, 23.0 ap367113, 23.0 ap367129, 23.0 ap367196, 23.0 ap367222, 23.0 ap367227, 23.0 ap367233, 23.0 ap367263, 23.0 ap367307, 23.0 ap367325, 23.0 ap367356, 23.0 ap367366, 23.0 ap367413, 23.0 ap367419, 23.0 ap367436, 23.0 ap367487, 23.0 ap367647, 23.0 ap367781, 23.0 ap367810, 23.0 ap367827, 23.0 ap367893, 23.0 ap367991, 23.0 ap368352, 23.0 ap368437, 23.0 ap368458, 23.0 ap368485, 23.0 ap368590, 23.0 ap368605, 23.0 ap368634, 23.0 ap368651, 23.0 ap368682, 23.0 ap368725, 23.0 ap368827, 23.0 ap368830, 23.0 ap368854, 23.0 ap368933, 23.0 ap369012, 23.0 ap369047, 23.0 ap369048, 23.0 ap369052, 23.0 ap369078, 23.0 ap369103, 23.0 ap369127, 23.0 ap369136, 23.0 ap369179, 23.0 ap369211, 23.0 ap369276, 23.0 ap369300, 23.0 ap369316, 23.0 ap369469, 23.0 ap369521, 23.0 ap369535, 23.0 ap369580, 23.0 ap369595, 23.0 ap369619, 23.0 ap369623, 23.0 ap369624, 23.0 ap369675, 23.0 ap369680, 23.0 ap369702, 23.0 ap369710, 23.0 ap369724, 23.0 ap369757, 23.0 ap369770, 23.0 ap369775, 23.0 ap369779, 23.0 ap369783, 23.0 ap369784, 23.0 ap369877, 23.0 ap369878, 23.0 ap369883, 23.0 ap369884, 23.0 ap369885, 23.0 ap369899, 23.0 ap369902, 23.0 ap369903, 23.0 ap369991, 23.0 ap369997, 23.0 ap370017, 23.0 ap370036, 23.0 ap370040, 23.0 ap370085, 23.0 ap370093, 23.0 ap370147, 23.0 ap370194, 23.0 ap370199, 23.0 ap370218, 23.0 ap370222, 23.0 ap370244, 23.0 ap370249, 23.0 ap370300, 23.0 ap370307, 23.0 ap370326, 23.0 ap370328, 23.0 ap370347, 23.0 ap370479, 23.0 ap370537, 23.0 ap370539, 23.0 ap370578, 23.0 ap370620, 23.0 ap370662, 23.0 ap370720, 23.0 ap370735, 23.0 ap370801, 23.0 ap370907, 23.0 ap370918, 23.0 ap370935, 23.0 ap371056, 23.0 ap371080, 23.0 ap371125, 23.0 ap371151, 23.0 ap371254, 23.0 ap371301, 23.0 ap371423, 23.0 ap371490, 23.0 ap371506, 23.0 ap371529, 23.0 ap371539, 23.0 ap371547, 23.0 ap371557, 23.0 ap371565, 23.0 ap371582, 23.0 ap371634, 23.0 ap371680, 23.0 ap371687, 23.0 ap371721, 23.0 ap371733, 23.0 ap371768, 23.0 ap371772, 23.0 ap371829, 23.0 ap371886, 23.0 ap371917, 23.0 ap371922, 23.0 ap371945, 23.0 ap371996, 23.0 ap372011, 23.0 ap372077, 23.0 ap372286, 23.0 ap372293, 23.0 ap372343, 23.0 ap372432, 23.0 ap372436, 23.0 ap372475, 23.0 ap372502, 23.0 ap372505, 23.0 ap372508, 23.0 ap372510, 23.0 ap372516, 23.0 ap372561, 23.0 ap372610, 23.0 ap372617, 23.0 ap372633, 23.0 ap372655, 23.0 ap372692, 23.0 ap372796, 23.0 ap372890, 23.0 ap372910, 23.0 ap372942, 23.0 ap372943, 23.0 ap372989, 23.0 ap373001, 23.0 ap373047, 23.0 ap373097, 23.0 ap373146, 23.0 ap373172, 23.0 ap373180, 23.0 ap373197, 23.0 ap373239, 23.0 ap373261, 23.0 ap373284, 23.0 ap373300, 23.0 ap373332, 23.0 ap373336, 23.0 ap373339, 23.0 ap373340, 23.0 ap373392, 23.0 ap373412, 23.0 ap373521, 23.0 ap373534, 23.0 ap373565, 23.0 ap373584, 23.0 ap373649, 23.0 ap373711, 23.0 ap373717, 23.0 ap373783, 23.0 ap373821, 23.0 ap373872, 23.0 ap373881, 23.0 ap373914, 23.0 ap373924, 23.0 ap374144, 23.0 ap374145, 23.0 ap374211, 23.0 ap374270, 23.0 ap374286, 23.0 ap374414, 23.0 ap374530, 23.0 ap374548, 23.0 ap374600, 23.0 ap374605, 23.0 ap374641, 23.0 ap374643, 23.0 ap374695, 23.0 ap374786, 23.0 ap374829, 23.0 ap374832, 23.0 ap374869, 23.0 ap374917, 23.0 ap374935, 23.0 ap374943, 23.0 ap374956, 23.0 ap375004, 23.0 ap375021, 23.0 ap375036, 23.0 ap375039, 23.0 ap375041, 23.0 ap375125, 23.0 ap375153, 23.0 ap375205, 23.0 ap375207, 23.0 ap375210, 23.0 ap375214, 23.0 ap375240, 23.0 ap375260, 23.0 ap375270, 23.0 ap375273, 23.0 ap375335, 23.0 ap375342, 23.0 ap375351, 23.0 ap375398, 23.0 ap375409, 23.0 ap375412, 23.0 ap375414, 23.0 ap375421, 23.0 ap375425, 23.0 ap375430, 23.0 ap375432, 23.0 ap375453, 23.0 ap375466, 23.0 ap375469, 23.0 ap375476, 23.0 ap375484, 23.0 ap375488, 23.0 ap375489, 23.0 ap375502, 23.0 ap375514, 23.0 ap375518, 23.0 ap375603, 23.0 ap375700, 23.0 ap375711, 23.0 ap375730, 23.0 ap375748, 23.0 ap375756, 23.0 ap375757, 23.0 ap375804, 23.0 ap375828, 23.0 ap375849, 23.0 ap375860, 23.0 ap375944, 23.0 ap375949, 23.0 ap375950, 23.0 ap375959, 23.0 ap375962, 23.0 ap375982, 23.0 ap375989, 23.0 ap375990, 23.0 ap375996, 23.0 ap376000, 23.0 ap376001, 23.0 ap376012, 23.0 ap376024, 23.0 ap376042, 23.0 ap376099, 23.0 ap376140, 23.0 ap376156, 23.0 ap376189, 23.0 ap376213, 23.0 ap376220, 23.0 ap376267, 23.0 ap376308, 23.0 ap376317, 23.0 ap376340, 23.0 ap376341, 23.0 ap376384, 23.0 ap376414, 23.0 ap376445, 23.0 ap376450, 23.0 ap376486, 23.0 ap376507, 23.0 ap376512, 23.0 ap376529, 23.0 ap376613, 23.0 ap376622, 23.0 ap376664, 23.0 ap376666, 23.0 ap376695, 23.0 ap376696, 23.0 ap376699, 23.0 ap376702, 23.0 ap376704, 23.0 ap376721, 23.0 ap376722, 23.0 ap376736, 23.0 ap376787, 23.0 ap376798, 23.0 ap376802, 23.0 ap376809, 23.0 ap376818, 23.0 ap376820, 23.0 ap376842, 23.0 ap376878, 23.0 ap376889, 23.0 ap376934, 23.0 ap376945, 23.0 ap376956, 23.0 ap376979, 23.0 ap377012, 23.0 ap377033, 23.0 ap377050, 23.0 ap377091, 23.0 ap377109, 23.0 ap377120, 23.0 ap377163, 23.0 ap377175, 23.0 ap377177, 23.0 ap377229, 23.0 ap377378, 23.0 ap377399, 23.0 ap377485, 23.0 ap377517, 23.0 ap377538, 23.0 ap377555, 23.0 ap377569, 23.0 ap377628, 23.0 ap377630, 23.0 ap377651, 23.0 ap377667, 23.0 ap377670, 23.0 ap377687, 23.0 ap377718, 23.0 ap377723, 23.0 ap377737, 23.0 ap377743, 23.0 ap377751, 23.0 ap377868, 23.0 ap377878, 23.0 ap377888, 23.0 ap377913, 23.0 ap377966, 23.0 ap377983, 23.0 ap378010, 23.0 ap378014, 23.0 ap378019, 23.0 ap378029, 23.0 ap378051, 23.0 ap378070, 23.0 ap378087, 23.0 ap378122, 23.0 ap378141, 23.0 ap378142, 23.0 ap378144, 23.0 ap378150, 23.0 ap378154, 23.0 ap378168, 23.0 ap378178, 23.0 ap378227, 23.0 ap378234, 23.0 ap378242, 23.0 ap378248, 23.0 ap378258, 23.0 ap378372, 23.0 ap378383, 23.0 ap378390, 23.0 ap378415, 23.0 ap378437, 23.0 ap378481, 23.0 ap378506, 23.0 ap378535, 23.0 ap378553, 23.0 ap378575, 23.0 ap378595, 23.0 ap378818, 23.0 ap378827, 23.0 ap378886, 23.0 ap378902, 23.0 ap378913, 23.0 ap378920, 23.0 ap378952, 23.0 ap378976, 23.0 ap378987, 23.0 ap378995, 23.0 ap379069, 23.0 ap379091, 23.0 ap379105, 23.0 ap379112, 23.0 ap379122, 23.0 ap379152, 23.0 ap379168, 23.0 ap379187, 23.0 ap379190, 23.0 ap379199, 23.0 ap379329, 23.0 ap379331, 23.0 ap379346, 23.0 ap379373, 23.0 ap379378, 23.0 ap379389, 23.0 ap379390, 23.0 ap379391, 23.0 ap379395, 23.0 ap379411, 23.0 ap379423, 23.0 ap379474, 23.0 ap379475, 23.0 ap379482, 23.0 ap379511, 23.0 ap379515, 23.0 ap379532, 23.0 ap379533, 23.0 ap379535, 23.0 ap379565, 23.0 ap379600, 23.0 ap379616, 23.0 ap379627, 23.0 ap379635, 23.0 ap379781, 23.0 ap379782, 23.0 ap379830, 23.0 ap379839, 23.0 ap379855, 23.0 ap379889, 23.0 ap379903, 23.0 ap379921, 23.0 ap379925, 23.0 ap379957, 23.0 ap379963, 23.0 ap380109, 23.0 ap380181, 23.0 ap380196, 23.0 ap380256, 23.0 ap380264, 23.0 ap380282, 23.0 ap380465, 23.0 ap380501, 23.0 ap380581, 23.0 ap380613, 23.0 ap380620, 23.0 ap380635, 23.0 ap380637, 23.0 ap380762, 23.0 ap380775, 23.0 ap380782, 23.0 ap380802, 23.0 ap380840, 23.0 ap380939, 23.0 ap381001, 23.0 ap381004, 23.0 ap381047, 23.0 ap381078, 23.0 ap381108, 23.0 ap381128, 23.0 ap381215, 23.0 ap381257, 23.0 ap381285, 23.0 ap381292, 23.0 ap381300, 23.0 ap381305, 23.0 ap381308, 23.0 ap381334, 23.0 ap381339, 23.0 ap381384, 23.0 ap381385, 23.0 ap381398, 23.0 ap381412, 23.0 ap381507, 23.0 ap381518, 23.0 ap381527, 23.0 ap381543, 23.0 ap381570, 23.0 ap381575, 23.0 ap381600, 23.0 ap381611, 23.0 ap381615, 23.0 ap381616, 23.0 ap381621, 23.0 ap381623, 23.0 ap381624, 23.0 ap381654, 23.0 ap381666, 23.0 ap381734, 23.0 ap381775, 23.0 ap381809, 23.0 ap381825, 23.0 ap381826, 23.0 ap381854, 23.0 ap381874, 23.0 ap381878, 23.0 ap381936, 23.0 ap381952, 23.0 ap381956, 23.0 ap381970, 23.0 ap381971, 23.0 ap381975, 23.0 ap382039, 23.0 ap382042, 23.0 ap382045, 23.0 ap382098, 23.0 ap382155, 23.0 ap382160, 23.0 ap382164, 23.0 ap382167, 23.0 ap382170, 23.0 ap382189, 23.0 ap382194, 23.0 ap382231, 23.0 ap382267, 23.0 ap382277, 23.0 ap382412, 23.0 ap382441, 23.0 ap382445, 23.0 ap382474, 23.0 ap382484, 23.0 ap382488, 23.0 ap382527, 23.0 ap382594, 23.0 ap382631, 23.0 ap382656, 23.0 ap382673, 23.0 ap382676, 23.0 ap382677, 23.0 ap382691, 23.0 ap382692, 23.0 ap382703, 23.0 ap382740, 23.0 ap382750, 23.0 ap382836, 23.0 ap382841, 23.0 ap382873, 23.0 ap382894, 23.0 ap382912, 23.0 ap382929, 23.0 ap382935, 23.0 ap382965, 23.0 ap382969, 23.0 ap382976, 23.0 ap382994, 23.0 ap383105, 23.0 ap383123, 23.0 ap383147, 23.0 ap383178, 23.0 ap383188, 23.0 ap383297, 23.0 ap383326, 23.0 ap383327, 23.0 ap383331, 23.0 ap383346, 23.0 ap383377, 23.0 ap383455, 23.0 ap383459, 23.0 ap383463, 23.0 ap383494, 23.0 ap383498, 23.0 ap383511, 23.0 ap383520, 23.0 ap383700, 23.0 ap383821, 23.0 ap384239, 23.0 ap384339, 23.0 ap384351, 23.0 ap384361, 23.0 ap384367, 23.0 ap384389, 23.0 ap384395, 23.0 ap384428, 23.0 ap384429, 23.0 ap384434, 23.0 ap384448, 23.0 ap384471, 23.0 ap384474, 23.0 ap384543, 23.0 ap384622, 23.0 ap384629, 23.0 ap384639, 23.0 ap384643, 23.0 ap384650, 23.0 ap356256, 23.0 ap360317, 23.0 ap362378, 23.0 ap363392, 23.0 ap364667, 23.0 ap365775, 23.0 ap365995, 23.0 ap366171, 23.0 ap366184, 23.0 ap366207, 23.0 ap366306, 23.0 ap366330, 23.0 ap366653, 23.0 ap366731, 23.0 ap366807, 23.0 ap367805, 23.0 ap367986, 23.0 ap368137, 23.0 ap369286, 23.0 ap369738, 23.0 ap369788, 23.0 ap369922, 23.0 ap369926, 23.0 ap370075, 23.0 ap370680, 23.0 ap370828, 23.0 ap371030, 23.0 ap371043, 23.0 ap371049, 23.0 ap371495, 23.0 ap371771, 23.0 ap371804, 23.0 ap371821, 23.0 ap372160, 23.0 ap372517, 23.0 ap372657, 23.0 ap373283, 23.0 ap373434, 23.0 ap373817, 23.0 ap374274, 23.0 ap374295, 23.0 ap374475, 23.0 ap374649, 23.0 ap374946, 23.0 ap374995, 23.0 ap375060, 23.0 ap376521, 23.0 ap377126, 23.0 ap378068, 23.0 ap378401, 23.0 ap378965, 23.0 ap379191, 23.0 ap379396, 23.0 ap379548, 23.0 ap379852, 23.0 ap380528, 23.0 ap380841, 23.0 ap380854, 23.0 ap381419, 23.0 ap381725, 23.0 ap381729, 23.0 ap382095, 23.0 ap382183, 23.0 ap382435, 23.0 ap382849, 23.0 ap384025, 23.0 ap384591, 23.0 ap384745, 23.0 ap384876, 23.0 ap384901, 23.0 ap384930, 23.0 ap384931, 23.0 ap385048, 23.0 ap385072, 23.0 ap362738, 23.0 ap364904, 23.0 ap365813, 23.0 ap366965, 23.0 ap368128, 23.0 ap369581, 23.0 ap370476, 23.0 ap377960, 23.0 ap381844, 23.0 ap384217, 23.0 ap384382, 23.0 ap384383, 23.0 ap384457, 23.0 ap384753, 23.0 ap384761, 23.0 ap384772, 23.0 ap384793, 23.0 ap384800, 23.0 ap384801, 23.0 ap384879, 23.0 ap384898, 23.0 ap384908, 23.0 ap384920, 23.0 ap384921, 23.0 ap384947, 23.0 ap384957, 23.0 ap384963, 23.0 ap385046, 23.0 ap385052, 23.0 ap385054, 23.0 ap385071, 23.0 ap385085, 23.0 ap385088, 23.0 ap385104, 23.0 ap385107, 23.0 ap385111, 23.0 ap385115, 23.0 ap385117, 23.0 ap385136, 23.0 ap385146, 23.0 ap385149, 23.0 ap385233, 23.0 ap385236, 23.0 ap385238, 23.0 ap385242, 23.0 ap385244, 23.0 ap385245, 23.0 ap385247, 23.0 ap385251, 23.0 ap385252, 23.0 ap385253, 23.0 ap385254, 23.0 ap385256, 23.0 ap385265, 22.0 ap347303, 22.0, 22.0 ap379636, 22.0 ap352927, 22.0 ap353464, 22.0 ap375345, 22.0 ap355095, 22.0 ap352969, 22.0 ap363049, 22.0 ap349872, 22.0 ap358026, 22.0 ap375466, 22.0 ap375197, 22.0 ap382358, 22.0 ap383603, 22.0 ap356705, 22.0 ap362680, 22.0 ap356797, 22.0 ap353663, 22.0 ap380366, 22.0 ap357146, 22.0 ap357613, 22.0 ap347741, 22.0 ap371890, 22.0 ap375601, 22.0 ap383686, 22.0 ap356422, 22.0 ap376340, 22.0 ap374901, 22.0 ap362872, 22.0 ap381970, 22.0 ap377577, 22.0 ap383600, 22.0 ap382057, 22.0 ap383720, 22.0 ap339395, 22.0 ap366268, 22.0 ap372620, 22.0 ap372243, 22.0 ap377651, 22.0 ap383459, 22.0 ap376000, 22.0 ap357856, 22.0 ap380196, 22.0 ap372607, 22.0 ap362313, 22.0 ap371974, 22.0 ap372995, 22.0 ap365170, 22.0 ap372504, 22.0 ap377628, 22.0 ap365983, 22.0 ap371721, 22.0 ap352180, 22.0 ap356317, 22.0 ap373151, 22.0 ap358511, 22.0 ap364753, 22.0 ap373004, 22.0 ap376634, 22.0 ap382236, 22.0 ap366807, 22.0 ap353419, 22.0 ap372922, 22.0 ap366181, 22.0 ap382206, 22.0 ap366290, 22.0 ap383594, 22.0 ap366609, 22.0 ap380756, 22.0 ap354474, 22.0 ap349400, 22.0 ap366395, 22.0 ap366443, 22.0 ap372455, 22.0 ap347895, 22.0 ap372533, 22.0 ap353530, 22.0 ap352375, 22.0 ap366842, 22.0 ap353025, 22.0 ap351936, 22.0 ap366207, 22.0 ap353315, 22.0 ap339206, 22.0 ap352341, 22.0 ap339584, 22.0 ap352961, 22.0 ap348633, 22.0 ap359922, 22.0 ap353558, 22.0 ap371725, 22.0 ap371432, 22.0 ap357819, 22.0 ap358289, 22.0 ap354719, 22.0 ap367227, 22.0 ap364519, 22.0 ap366360, 22.0 ap367014, 22.0 ap360797, 22.0 ap366120, 22.0 ap372207, 22.0 ap365829, 22.0 ap365979, 22.0 ap366993, 22.0 ap365124, 22.0 ap366763, 22.0 ap352238, 22.0 ap383319, 22.0 ap351160, 22.0 ap366373, 22.0 ap372071, 22.0 ap371527, 22.0 ap354673, 22.0 ap371868, 22.0 ap353954, 22.0 ap366800, 22.0 ap357760, 22.0 ap366298, 22.0 ap366857, 22.0 ap365886, 22.0 ap372116, 22.0 ap354726, 22.0 ap364956, 22.0 ap382703, 22.0 ap351637, 22.0 ap367293, 22.0 ap360116, 22.0 ap366307, 22.0 ap368497, 22.0 ap368125, 22.0 ap352359, 22.0 ap364168, 22.0 ap376001, 22.0 ap366411, 22.0 ap365773, 22.0 ap362262, 22.0 ap351205, 22.0 ap383512, 22.0 ap355020, 22.0 ap352985, 22.0 ap354580, 22.0 ap373821, 22.0 ap376308, 22.0 ap368419, 22.0 ap353140, 22.0 ap374668, 22.0 ap364925, 22.0 ap367732, 22.0 ap372079, 22.0 ap357506, 22.0 ap380486, 22.0 ap366684, 22.0 ap366398, 22.0 ap358328, 22.0 ap373016, 22.0 ap358597, 22.0 ap383356, 22.0 ap383346, 22.0 ap374786, 22.0 ap348687, 22.0 ap352498, 22.0 ap366247, 22.0 ap351868, 22.0 ap383494, 22.0 ap367419, 22.0 ap369731, 22.0 ap379780, 22.0 ap383511, 22.0 ap353911, 22.0 ap357087, 22.0 ap375331, 22.0 ap359119, 22.0 ap364384, 22.0 ap351263, 22.0 ap360568, 22.0 ap382493, 22.0 ap361308, 22.0 ap364369, 22.0 ap365030, 22.0 ap372121, 22.0 ap371748, 22.0 ap372345, 22.0 ap365341, 22.0 ap365386, 22.0 ap365017, 22.0 ap383754, 22.0 ap355740, 22.0 ap364879, 22.0 ap365014, 22.0 ap365351, 22.0 ap364843, 22.0 ap374715, 22.0 ap364718, 22.0 ap363394, 22.0 ap363366, 22.0 ap364467, 22.0 ap365775, 22.0 ap366916, 22.0 ap363363, 22.0 ap365348, 22.0 ap359767, 22.0 ap364754, 22.0 ap365066, 22.0 ap370147, 22.0 ap365682, 22.0 ap365246, 22.0 ap374557, 22.0 ap364863, 22.0 ap365155, 22.0 ap374507, 22.0 ap381952, 22.0 ap370792, 22.0 ap363768, 22.0 ap366606, 22.0 ap363644, 22.0 ap375533, 22.0 ap376140, 22.0 ap367446, 22.0 ap372845, 22.0 ap373708, 22.0 ap362261, 22.0 ap373817, 22.0 ap373684, 22.0 ap374188, 22.0 ap373283, 22.0 ap376088, 22.0 ap374069, 22.0 ap374182, 22.0 ap377012, 22.0 ap382484, 22.0 ap367794, 22.0 ap366898, 22.0 ap369778, 22.0 ap374532, 22.0 ap373752, 22.0 ap373912, 22.0 ap374143, 22.0 ap381654, 22.0 ap350604, 22.0 ap369749, 22.0 ap368180, 22.0 ap377378, 22.0 ap360755, 22.0 ap373969, 22.0 ap369991, 22.0 ap379839, 22.0 ap358894, 22.0 ap366882, 22.0 ap358889, 22.0 ap360867, 22.0 ap369774, 22.0 ap359973, 22.0 ap354412, 22.0 ap348431, 22.0 ap373871, 22.0 ap377176, 22.0 ap375295, 22.0 ap358699, 22.0 ap348100, 22.0 ap374125, 22.0 ap359646, 22.0 ap358890, 22.0 ap352126, 22.0 ap351795, 22.0 ap353184, 22.0 ap349845, 22.0 ap357595, 22.0 ap352143, 22.0 ap357736, 22.0 ap358871, 22.0 ap352651, 22.0 ap351682, 22.0 ap348143, 22.0 ap352248, 22.0 ap351798, 22.0 ap352345, 22.0 ap354685, 22.0 ap352357, 22.0 ap358076, 22.0 ap358338, 22.0 ap351179, 22.0 ap358861, 22.0 ap361155, 22.0 ap356842, 22.0 ap361590, 22.0 ap357918, 22.0 ap355907, 22.0 ap358133, 22.0 ap354314, 22.0 ap371811, 22.0 ap361516, 22.0 ap357176, 22.0 ap352386, 22.0 ap362829, 22.0 ap358188, 22.0 ap363730, 22.0 ap357562, 22.0 ap360464, 22.0 ap357623, 22.0 ap366967, 22.0 ap383520, 22.0 ap369899, 22.0 ap361651, 22.0 ap356817, 22.0 ap359283, 22.0 ap371565, 22.0 ap355887, 22.0 ap355753, 22.0 ap375501, 22.0 ap371547, 22.0 ap350538, 22.0 ap359791, 22.0 ap372516, 22.0 ap372692, 22.0 ap357802, 22.0 ap358089, 22.0 ap371506, 22.0 ap366335, 22.0 ap362035, 22.0 ap362749, 22.0 ap353845, 22.0 ap352293, 22.0 ap381348, 22.0 ap354736, 22.0 ap350140, 22.0 ap381419, 22.0 ap356375, 22.0 ap381357, 22.0 ap381631, 22.0 ap371634, 22.0 ap371687, 22.0 ap355298, 22.0 ap373015, 22.0 ap374269, 22.0 ap374946, 22.0 ap372610, 22.0 ap366525, 22.0 ap374711, 22.0 ap366201, 22.0 ap355114, 22.0 ap372234, 22.0 ap373778, 22.0 ap365239, 22.0 ap367782, 22.0 ap354129, 22.0 ap369702, 22.0 ap381384, 22.0 ap352796, 22.0 ap350990, 22.0 ap358314, 22.0 ap368827, 22.0 ap372239, 22.0 ap372796, 22.0 ap349254, 22.0 ap368682, 22.0 ap366275, 22.0 ap354690, 22.0 ap365744, 22.0 ap354779, 22.0 ap368458, 22.0 ap365223, 22.0 ap367235, 22.0 ap366296, 22.0 ap364518, 22.0 ap352887, 22.0 ap359972, 22.0 ap360306, 22.0 ap359433, 22.0 ap374600, 22.0 ap359991, 22.0 ap351015, 22.0 ap359729, 22.0 ap373003, 22.0 ap371698, 22.0 ap366610, 22.0 ap369286, 22.0 ap358357, 22.0 ap367647, 22.0 ap379111, 22.0 ap381513, 22.0 ap380492, 22.0 ap371747, 22.0 ap368352, 22.0 ap375502, 22.0 ap380404, 22.0 ap371829, 22.0 ap373434, 22.0 ap372343, 22.0 ap365889, 22.0 ap364560, 22.0 ap364622, 22.0 ap367349, 22.0 ap366772, 22.0 ap359172, 22.0 ap383821, 22.0 ap353515, 22.0 ap362960, 22.0 ap369048, 22.0 ap365626, 22.0 ap364711, 22.0 ap362364, 22.0 ap360244, 22.0 ap362149, 22.0 ap362747, 22.0 ap382164, 22.0 ap353426, 22.0 ap358013, 22.0 ap382170, 22.0 ap383825, 22.0 ap368830, 22.0 ap369931, 22.0 ap367805, 22.0 ap375653, 22.0 ap364960, 22.0 ap361024, 22.0 ap362708, 22.0 ap381874, 22.0 ap371314, 22.0 ap364009, 22.0 ap367874, 22.0 ap360966, 22.0 ap361577, 22.0 ap382155, 22.0 ap361008, 22.0 ap370660, 22.0 ap377079, 22.0 ap371319, 22.0 ap376710, 22.0 ap364862, 22.0 ap371530, 22.0 ap364897, 22.0 ap352835, 22.0 ap382183, 22.0 ap377228, 22.0 ap365946, 22.0 ap362964, 22.0 ap360906, 22.0 ap376702, 22.0 ap357166, 22.0 ap357640, 22.0 ap371268, 22.0 ap370017, 22.0 ap380691, 22.0 ap370644, 22.0 ap361354, 22.0 ap361100, 22.0 ap361507, 22.0 ap378010, 22.0 ap356186, 22.0 ap355126, 22.0 ap361695, 22.0 ap371112, 22.0 ap360503, 22.0 ap362963, 22.0 ap357187, 22.0 ap369523, 22.0 ap381965, 22.0 ap382259, 22.0 ap382864, 22.0 ap353015, 22.0 ap371456, 22.0 ap371582, 22.0 ap372012, 22.0 ap383716, 22.0 ap383909, 22.0 ap383701, 22.0 ap383797, 22.0 ap384211, 22.0 ap348078, 22.0 ap342836, 22.0 ap343616, 22.0 ap346307, 22.0 ap342175, 22.0 ap345032, 22.0 ap339371, 22.0 ap353835, 22.0 ap351023, 22.0 ap354355, 22.0 ap353903, 22.0 ap354070, 22.0 ap354354, 22.0 ap349850, 22.0 ap354027, 22.0 ap354154, 22.0 ap354069, 22.0 ap353915, 22.0 ap353865, 22.0 ap348472, 22.0 ap350800, 22.0 ap350032, 22.0 ap349201, 22.0 ap350217, 22.0 ap353841, 22.0 ap350179, 22.0 ap354313, 22.0 ap354098, 22.0 ap353975, 22.0 ap348945, 22.0 ap354090, 22.0 ap352325, 22.0 ap350176, 22.0 ap352402, 22.0 ap350405, 22.0 ap352928, 22.0 ap350573, 22.0 ap353357, 22.0 ap352516, 22.0 ap352109, 22.0 ap352330, 22.0 ap353120, 22.0 ap351250, 22.0 ap353384, 22.0 ap353490, 22.0 ap352421, 22.0 ap352766, 22.0 ap351924, 22.0 ap351817, 22.0 ap353676, 22.0 ap352178, 22.0 ap352962, 22.0 ap351721, 22.0 ap352795, 22.0 ap352703, 22.0 ap353549, 22.0 ap353418, 22.0 ap353358, 22.0 ap353179, 22.0 ap351960, 22.0 ap353162, 22.0 ap353520, 22.0 ap352304, 22.0 ap353390, 22.0 ap351700, 22.0 ap351973, 22.0 ap352372, 22.0 ap352205, 22.0 ap352515, 22.0 ap353360, 22.0 ap352932, 22.0 ap354921, 22.0 ap352726, 22.0 ap352707, 22.0 ap355000, 22.0 ap352896, 22.0 ap355757, 22.0 ap352972, 22.0 ap353577, 22.0 ap352493, 22.0 ap355636, 22.0 ap356603, 22.0 ap354784, 22.0 ap354448, 22.0 ap355894, 22.0 ap355385, 22.0 ap353458, 22.0 ap352837, 22.0 ap353311, 22.0 ap354646, 22.0 ap352337, 22.0 ap355300, 22.0 ap353372, 22.0 ap355083, 22.0 ap357047, 22.0 ap353681, 22.0 ap356164, 22.0 ap355027, 22.0 ap356412, 22.0 ap356848, 22.0 ap356706, 22.0 ap355946, 22.0 ap356474, 22.0 ap354750, 22.0 ap356799, 22.0 ap356432, 22.0 ap354927, 22.0 ap353699, 22.0 ap355443, 22.0 ap356330, 22.0 ap356512, 22.0 ap357083, 22.0 ap355647, 22.0 ap356328, 22.0 ap355774, 22.0 ap354519, 22.0 ap355343, 22.0 ap355091, 22.0 ap354785, 22.0 ap354793, 22.0 ap354374, 22.0 ap355905, 22.0 ap354764, 22.0 ap355672, 22.0 ap355080, 22.0 ap356253, 22.0 ap354528, 22.0 ap355070, 22.0 ap355365, 22.0 ap355353, 22.0 ap355286, 22.0 ap356359, 22.0 ap356434, 22.0 ap355952, 22.0 ap356000, 22.0 ap354909, 22.0 ap354964, 22.0 ap355916, 22.0 ap355555, 22.0 ap355775, 22.0 ap354936, 22.0 ap356271, 22.0 ap355285, 22.0 ap355616, 22.0 ap355674, 22.0 ap356538, 22.0 ap356749, 22.0 ap356960, 22.0 ap355922, 22.0 ap357347, 22.0 ap355812, 22.0 ap354597, 22.0 ap356458, 22.0 ap353701, 22.0 ap356140, 22.0 ap356319, 22.0 ap354413, 22.0 ap357378, 22.0 ap357395, 22.0 ap357400, 22.0 ap356774, 22.0 ap356551, 22.0 ap351262, 22.0 ap357632, 22.0 ap357040, 22.0 ap356390, 22.0 ap357607, 22.0 ap357525, 22.0 ap354769, 22.0 ap357447, 22.0 ap358893, 22.0 ap357560, 22.0 ap357645, 22.0 ap359029, 22.0 ap357768, 22.0 ap357608, 22.0 ap357655, 22.0 ap357597, 22.0 ap357859, 22.0 ap358578, 22.0 ap359145, 22.0 ap358099, 22.0 ap357471, 22.0 ap358092, 22.0 ap357571, 22.0 ap359111, 22.0 ap357523, 22.0 ap357769, 22.0 ap358469, 22.0 ap357621, 22.0 ap359525, 22.0 ap357795, 22.0 ap358399, 22.0 ap358493, 22.0 ap359049, 22.0 ap358971, 22.0 ap358246, 22.0 ap358234, 22.0 ap358345, 22.0 ap359112, 22.0 ap358291, 22.0 ap358059, 22.0 ap358582, 22.0 ap359589, 22.0 ap358453, 22.0 ap359434, 22.0 ap358290, 22.0 ap357791, 22.0 ap359156, 22.0 ap358034, 22.0 ap358119, 22.0 ap359549, 22.0 ap357718, 22.0 ap358454, 22.0 ap357775, 22.0 ap358132, 22.0 ap358603, 22.0 ap358515, 22.0 ap358563, 22.0 ap359674, 22.0 ap359121, 22.0 ap359103, 22.0 ap360250, 22.0 ap360564, 22.0 ap359227, 22.0 ap359127, 22.0 ap358887, 22.0 ap359106, 22.0 ap363144, 22.0 ap359829, 22.0 ap359649, 22.0 ap358995, 22.0 ap361101, 22.0 ap359470, 22.0 ap359218, 22.0 ap359769, 22.0 ap359465, 22.0 ap360164, 22.0 ap360007, 22.0 ap359001, 22.0 ap360365, 22.0 ap359748, 22.0 ap360495, 22.0 ap360931, 22.0 ap360817, 22.0 ap360459, 22.0 ap359911, 22.0 ap363146, 22.0 ap360201, 22.0 ap360586, 22.0 ap359974, 22.0 ap361054, 22.0 ap361153, 22.0 ap360904, 22.0 ap359644, 22.0 ap360265, 22.0 ap359765, 22.0 ap363145, 22.0 ap360816, 22.0 ap361116, 22.0 ap360600, 22.0 ap360362, 22.0 ap362247, 22.0 ap360912, 22.0 ap360960, 22.0 ap360184, 22.0 ap360740, 22.0 ap361353, 22.0 ap361696, 22.0 ap361076, 22.0 ap360531, 22.0 ap362532, 22.0 ap361520, 22.0 ap361974, 22.0 ap362771, 22.0 ap361598, 22.0 ap361445, 22.0 ap361833, 22.0 ap361560, 22.0 ap362143, 22.0 ap362367, 22.0 ap362848, 22.0 ap362610, 22.0 ap361559, 22.0 ap361820, 22.0 ap360325, 22.0 ap361835, 22.0 ap362683, 22.0 ap361533, 22.0 ap361883, 22.0 ap362150, 22.0 ap362163, 22.0 ap361854, 22.0 ap362548, 22.0 ap362001, 22.0 ap362276, 22.0 ap362825, 22.0 ap362707, 22.0 ap362298, 22.0 ap362637, 22.0 ap362619, 22.0 ap362490, 22.0 ap361934, 22.0 ap363082, 22.0 ap362373, 22.0 ap362553, 22.0 ap361154, 22.0 ap362710, 22.0 ap362799, 22.0 ap362088, 22.0 ap362122, 22.0 ap364194, 22.0 ap361834, 22.0 ap361666, 22.0 ap363430, 22.0 ap362492, 22.0 ap362713, 22.0 ap363753, 22.0 ap362182, 22.0 ap362644, 22.0 ap367820, 22.0 ap363584, 22.0 ap363815, 22.0 ap362328, 22.0 ap364223, 22.0 ap363332, 22.0 ap363867, 22.0 ap362575, 22.0 ap362831, 22.0 ap363361, 22.0 ap363760, 22.0 ap368026, 22.0 ap363521, 22.0 ap364048, 22.0 ap367675, 22.0 ap364199, 22.0 ap363233, 22.0 ap363666, 22.0 ap364256, 22.0 ap363831, 22.0 ap363568, 22.0 ap367974, 22.0 ap364278, 22.0 ap363824, 22.0 ap367969, 22.0 ap363372, 22.0 ap363759, 22.0 ap368067, 22.0 ap363976, 22.0 ap363218, 22.0 ap363596, 22.0 ap368015, 22.0 ap366118, 22.0 ap364213, 22.0 ap364275, 22.0 ap364291, 22.0 ap363213, 22.0 ap366397, 22.0 ap366624, 22.0 ap363582, 22.0 ap364125, 22.0 ap366252, 22.0 ap363234, 22.0 ap363408, 22.0 ap366701, 22.0 ap366715, 22.0 ap366221, 22.0 ap366301, 22.0 ap364214, 22.0 ap366174, 22.0 ap363846, 22.0 ap364258, 22.0 ap365970, 22.0 ap363729, 22.0 ap363265, 22.0 ap363770, 22.0 ap366784, 22.0 ap366348, 22.0 ap366803, 22.0 ap366358, 22.0 ap366744, 22.0 ap366180, 22.0 ap366649, 22.0 ap364500, 22.0 ap365172, 22.0 ap365995, 22.0 ap366486, 22.0 ap366430, 22.0 ap366261, 22.0 ap366490, 22.0 ap366375, 22.0 ap366211, 22.0 ap365115, 22.0 ap366295, 22.0 ap364778, 22.0 ap366656, 22.0 ap364834, 22.0 ap364670, 22.0 ap364521, 22.0 ap366117, 22.0 ap364905, 22.0 ap364471, 22.0 ap364699, 22.0 ap364922, 22.0 ap364844, 22.0 ap364745, 22.0 ap364781, 22.0 ap365146, 22.0 ap366747, 22.0 ap364898, 22.0 ap364635, 22.0 ap364797, 22.0 ap364651, 22.0 ap364932, 22.0 ap364860, 22.0 ap366677, 22.0 ap367298, 22.0 ap365545, 22.0 ap367513, 22.0 ap365390, 22.0 ap364805, 22.0 ap365800, 22.0 ap365173, 22.0 ap365171, 22.0 ap364761, 22.0 ap364924, 22.0 ap365167, 22.0 ap364473, 22.0 ap365584, 22.0 ap365400, 22.0 ap367396, 22.0 ap365632, 22.0 ap365905, 22.0 ap367109, 22.0 ap365449, 22.0 ap367338, 22.0 ap365515, 22.0 ap367001, 22.0 ap365577, 22.0 ap365685, 22.0 ap367207, 22.0 ap367434, 22.0 ap365597, 22.0 ap365801, 22.0 ap365815, 22.0 ap365759, 22.0 ap365730, 22.0 ap365662, 22.0 ap365758, 22.0 ap365920, 22.0 ap365556, 22.0 ap367290, 22.0 ap367517, 22.0 ap367183, 22.0 ap370911, 22.0 ap367340, 22.0 ap371050, 22.0 ap371313, 22.0 ap371436, 22.0 ap367291, 22.0 ap371654, 22.0 ap365727, 22.0 ap371470, 22.0 ap371703, 22.0 ap365511, 22.0 ap367524, 22.0 ap365576, 22.0 ap370802, 22.0 ap365379, 22.0 ap365944, 22.0 ap371587, 22.0 ap366959, 22.0 ap365372, 22.0 ap367453, 22.0 ap371202, 22.0 ap365601, 22.0 ap371836, 22.0 ap365779, 22.0 ap365858, 22.0 ap371919, 22.0 ap367294, 22.0 ap366972, 22.0 ap372163, 22.0 ap371871, 22.0 ap367461, 22.0 ap371343, 22.0 ap370948, 22.0 ap371437, 22.0 ap367206, 22.0 ap372043, 22.0 ap372016, 22.0 ap371999, 22.0 ap370817, 22.0 ap367367, 22.0 ap372072, 22.0 ap372338, 22.0 ap371134, 22.0 ap372177, 22.0 ap370952, 22.0 ap371455, 22.0 ap372178, 22.0 ap371926, 22.0 ap372351, 22.0 ap372017, 22.0 ap370884, 22.0 ap371361, 22.0 ap371681, 22.0 ap372354, 22.0 ap372100, 22.0 ap371262, 22.0 ap371775, 22.0 ap371613, 22.0 ap371656, 22.0 ap372192, 22.0 ap371610, 22.0 ap371895, 22.0 ap371155, 22.0 ap371546, 22.0 ap371516, 22.0 ap371281, 22.0 ap371770, 22.0 ap371033, 22.0 ap370908, 22.0 ap368308, 22.0 ap371583, 22.0 ap368461, 22.0 ap371195, 22.0 ap371366, 22.0 ap371911, 22.0 ap371467, 22.0 ap372371, 22.0 ap368695, 22.0 ap368140, 22.0 ap368603, 22.0 ap371805, 22.0 ap371977, 22.0 ap368913, 22.0 ap368987, 22.0 ap372024, 22.0 ap372152, 22.0 ap371682, 22.0 ap371627, 22.0 ap371961, 22.0 ap371295, 22.0 ap369674, 22.0 ap369607, 22.0 ap369173, 22.0 ap369863, 22.0 ap369433, 22.0 ap369641, 22.0 ap368604, 22.0 ap368087, 22.0 ap368706, 22.0 ap370103, 22.0 ap368216, 22.0 ap369934, 22.0 ap368326, 22.0 ap369855, 22.0 ap368510, 22.0 ap369501, 22.0 ap368195, 22.0 ap369693, 22.0 ap368327, 22.0 ap368957, 22.0 ap368612, 22.0 ap369219, 22.0 ap368568, 22.0 ap369227, 22.0 ap368422, 22.0 ap369454, 22.0 ap368217, 22.0 ap369529, 22.0 ap368887, 22.0 ap368096, 22.0 ap368754, 22.0 ap368601, 22.0 ap368970, 22.0 ap369106, 22.0 ap369881, 22.0 ap369550, 22.0 ap369748, 22.0 ap368978, 22.0 ap370113, 22.0 ap369478, 22.0 ap369132, 22.0 ap368660, 22.0 ap369667, 22.0 ap369295, 22.0 ap369473, 22.0 ap369065, 22.0 ap369668, 22.0 ap369571, 22.0 ap370645, 22.0 ap370696, 22.0 ap372433, 22.0 ap370654, 22.0 ap370138, 22.0 ap370615, 22.0 ap372567, 22.0 ap372522, 22.0 ap369929, 22.0 ap372643, 22.0 ap369800, 22.0 ap372708, 22.0 ap372389, 22.0 ap370590, 22.0 ap372390, 22.0 ap372690, 22.0 ap372757, 22.0 ap372560, 22.0 ap370636, 22.0 ap370579, 22.0 ap372674, 22.0 ap372750, 22.0 ap372706, 22.0 ap370269, 22.0 ap370160, 22.0 ap370180, 22.0 ap370667, 22.0 ap370186, 22.0 ap370563, 22.0 ap370627, 22.0 ap370258, 22.0 ap370675, 22.0 ap370344, 22.0 ap370217, 22.0 ap370349, 22.0 ap372623, 22.0 ap370737, 22.0 ap372488, 22.0 ap370424, 22.0 ap370193, 22.0 ap370170, 22.0 ap374680, 22.0 ap370544, 22.0 ap374714, 22.0 ap370465, 22.0 ap374838, 22.0 ap374169, 22.0 ap374822, 22.0 ap374339, 22.0 ap374092, 22.0 ap370459, 22.0 ap370545, 22.0 ap370389, 22.0 ap374799, 22.0 ap370437, 22.0 ap374265, 22.0 ap374803, 22.0 ap370275, 22.0 ap374430, 22.0 ap370177, 22.0 ap370358, 22.0 ap373918, 22.0 ap370179, 22.0 ap374677, 22.0 ap370196, 22.0 ap372854, 22.0 ap373539, 22.0 ap372968, 22.0 ap373813, 22.0 ap373118, 22.0 ap373855, 22.0 ap373820, 22.0 ap373438, 22.0 ap373647, 22.0 ap374660, 22.0 ap373102, 22.0 ap373391, 22.0 ap373303, 22.0 ap373302, 22.0 ap373562, 22.0 ap373196, 22.0 ap373564, 22.0 ap373732, 22.0 ap373018, 22.0 ap373954, 22.0 ap374230, 22.0 ap373950, 22.0 ap373664, 22.0 ap374330, 22.0 ap374460, 22.0 ap374312, 22.0 ap374113, 22.0 ap373034, 22.0 ap372956, 22.0 ap373111, 22.0 ap373189, 22.0 ap374488, 22.0 ap374354, 22.0 ap373285, 22.0 ap372974, 22.0 ap374114, 22.0 ap373122, 22.0 ap373257, 22.0 ap373108, 22.0 ap372994, 22.0 ap374238, 22.0 ap374356, 22.0 ap372932, 22.0 ap373315, 22.0 ap373299, 22.0 ap373137, 22.0 ap375069, 22.0 ap373482, 22.0 ap373899, 22.0 ap374971, 22.0 ap373777, 22.0 ap373644, 22.0 ap375734, 22.0 ap375625, 22.0 ap375862, 22.0 ap375354, 22.0 ap375655, 22.0 ap375688, 22.0 ap373318, 22.0 ap375441, 22.0 ap375291, 22.0 ap373046, 22.0 ap374031, 22.0 ap375200, 22.0 ap373452, 22.0 ap374334, 22.0 ap374131, 22.0 ap374428, 22.0 ap374254, 22.0 ap375936, 22.0 ap374596, 22.0 ap372963, 22.0 ap373008, 22.0 ap376504, 22.0 ap373117, 22.0 ap376041, 22.0 ap376410, 22.0 ap376179, 22.0 ap376298, 22.0 ap376355, 22.0 ap376523, 22.0 ap376485, 22.0 ap372799, 22.0 ap376577, 22.0 ap376181, 22.0 ap375090, 22.0 ap376416, 22.0 ap373098, 22.0 ap374977, 22.0 ap375206, 22.0 ap376602, 22.0 ap375309, 22.0 ap375937, 22.0 ap376531, 22.0 ap375465, 22.0 ap375254, 22.0 ap375464, 22.0 ap375865, 22.0 ap375672, 22.0 ap375793, 22.0 ap374891, 22.0 ap375321, 22.0 ap376100, 22.0 ap375634, 22.0 ap375382, 22.0 ap375091, 22.0 ap375018, 22.0 ap375743, 22.0 ap375383, 22.0 ap376508, 22.0 ap375646, 22.0 ap375661, 22.0 ap375709, 22.0 ap376426, 22.0 ap375984, 22.0 ap375719, 22.0 ap375908, 22.0 ap376117, 22.0 ap376535, 22.0 ap375266, 22.0 ap375654, 22.0 ap376614, 22.0 ap375038, 22.0 ap376541, 22.0 ap376513, 22.0 ap375509, 22.0 ap375343, 22.0 ap379772, 22.0 ap375685, 22.0 ap376356, 22.0 ap376218, 22.0 ap375133, 22.0 ap374895, 22.0 ap376429, 22.0 ap376402, 22.0 ap375413, 22.0 ap379838, 22.0 ap379874, 22.0 ap380187, 22.0 ap380143, 22.0 ap379972, 22.0 ap380535, 22.0 ap375797, 22.0 ap379847, 22.0 ap380117, 22.0 ap379775, 22.0 ap380512, 22.0 ap380446, 22.0 ap379752, 22.0 ap380396, 22.0 ap380167, 22.0 ap376261, 22.0 ap376010, 22.0 ap380473, 22.0 ap380371, 22.0 ap380232, 22.0 ap376147, 22.0 ap375924, 22.0 ap375720, 22.0 ap380506, 22.0 ap379833, 22.0 ap380108, 22.0 ap376633, 22.0 ap376661, 22.0 ap380161, 22.0 ap379917, 22.0 ap380201, 22.0 ap380180, 22.0 ap380401, 22.0 ap379951, 22.0 ap380507, 22.0 ap380449, 22.0 ap379853, 22.0 ap380041, 22.0 ap380391, 22.0 ap379795, 22.0 ap380128, 22.0 ap380239, 22.0 ap379848, 22.0 ap380137, 22.0 ap380532, 22.0 ap379934, 22.0 ap376988, 22.0 ap380099, 22.0 ap376860, 22.0 ap376989, 22.0 ap376752, 22.0 ap376642, 22.0 ap377107, 22.0 ap376701, 22.0 ap376668, 22.0 ap377225, 22.0 ap377384, 22.0 ap376953, 22.0 ap376670, 22.0 ap376935, 22.0 ap377480, 22.0 ap377497, 22.0 ap377581, 22.0 ap377727, 22.0 ap377802, 22.0 ap376652, 22.0 ap380130, 22.0 ap376656, 22.0 ap376685, 22.0 ap376984, 22.0 ap378140, 22.0 ap376620, 22.0 ap376762, 22.0 ap377982, 22.0 ap376844, 22.0 ap378405, 22.0 ap377494, 22.0 ap377625, 22.0 ap377147, 22.0 ap377755, 22.0 ap378440, 22.0 ap377483, 22.0 ap377042, 22.0 ap377523, 22.0 ap378218, 22.0 ap378581, 22.0 ap378334, 22.0 ap377307, 22.0 ap377389, 22.0 ap377566, 22.0 ap378585, 22.0 ap378055, 22.0 ap378153, 22.0 ap377149, 22.0 ap378471, 22.0 ap378485, 22.0 ap377900, 22.0 ap378257, 22.0 ap377412, 22.0 ap378425, 22.0 ap378391, 22.0 ap377496, 22.0 ap377164, 22.0 ap378393, 22.0 ap377908, 22.0 ap377068, 22.0 ap378025, 22.0 ap378259, 22.0 ap377409, 22.0 ap378419, 22.0 ap377757, 22.0 ap377327, 22.0 ap377680, 22.0 ap377329, 22.0 ap378161, 22.0 ap377045, 22.0 ap378332, 22.0 ap379016, 22.0 ap378866, 22.0 ap377963, 22.0 ap379461, 22.0 ap379326, 22.0 ap378079, 22.0 ap378436, 22.0 ap378164, 22.0 ap378966, 22.0 ap378509, 22.0 ap378953, 22.0 ap377779, 22.0 ap378823, 22.0 ap377715, 22.0 ap379151, 22.0 ap378400, 22.0 ap379350, 22.0 ap379008, 22.0 ap377578, 22.0 ap379098, 22.0 ap379524, 22.0 ap379694, 22.0 ap379597, 22.0 ap378880, 22.0 ap379531, 22.0 ap378863, 22.0 ap378882, 22.0 ap379427, 22.0 ap379493, 22.0 ap379389, 22.0 ap379556, 22.0 ap379487, 22.0 ap378970, 22.0 ap379374, 22.0 ap379465, 22.0 ap379153, 22.0 ap379165, 22.0 ap378599, 22.0 ap378862, 22.0 ap379080, 22.0 ap379085, 22.0 ap378924, 22.0 ap381029, 22.0 ap382225, 22.0 ap381125, 22.0 ap378603, 22.0 ap381410, 22.0 ap380771, 22.0 ap381518, 22.0 ap380537, 22.0 ap381594, 22.0 ap381243, 22.0 ap378865, 22.0 ap380697, 22.0 ap380629, 22.0 ap380751, 22.0 ap382300, 22.0 ap382158, 22.0 ap381072, 22.0 ap378999, 22.0 ap380914, 22.0 ap380936, 22.0 ap381136, 22.0 ap380737, 22.0 ap381781, 22.0 ap380555, 22.0 ap380817, 22.0 ap381137, 22.0 ap382240, 22.0 ap381270, 22.0 ap382032, 22.0 ap382362, 22.0 ap381523, 22.0 ap381609, 22.0 ap381569, 22.0 ap381275, 22.0 ap381498, 22.0 ap382192, 22.0 ap381622, 22.0 ap381418, 22.0 ap380970, 22.0 ap381091, 22.0 ap381810, 22.0 ap382251, 22.0 ap381732, 22.0 ap382053, 22.0 ap382198, 22.0 ap382372, 22.0 ap382195, 22.0 ap380626, 22.0 ap381584, 22.0 ap380818, 22.0 ap381118, 22.0 ap380739, 22.0 ap381009, 22.0 ap382252, 22.0 ap381140, 22.0 ap381504, 22.0 ap381367, 22.0 ap382409, 22.0 ap382993, 22.0 ap382717, 22.0 ap383372, 22.0 ap382945, 22.0 ap383569, 22.0 ap382951, 22.0 ap382487, 22.0 ap383002, 22.0 ap383168, 22.0 ap382434, 22.0 ap383170, 22.0 ap383655, 22.0 ap382615, 22.0 ap382524, 22.0 ap383309, 22.0 ap383514, 22.0 ap382824, 22.0 ap382903, 22.0 ap383710, 22.0 ap383519, 22.0 ap383367, 22.0 ap382838, 22.0 ap383562, 22.0 ap382977, 22.0 ap382488, 22.0 ap383134, 22.0 ap383706, 22.0 ap383150, 22.0 ap382954, 22.0 ap382432, 22.0 ap382386, 22.0 ap382476, 22.0 ap347536, 22.0 ap347644, 22.0 ap347645, 22.0 ap347673, 22.0 ap347677, 22.0 ap347726, 22.0 ap348474, 22.0 ap348575, 22.0 ap348766, 22.0 ap349235, 22.0 ap349441, 22.0 ap349501, 22.0 ap349582, 22.0 ap349664, 22.0 ap349820, 22.0 ap349858, 22.0 ap350056, 22.0 ap350175, 22.0 ap350471, 22.0 ap350527, 22.0 ap350564, 22.0 ap350603, 22.0 ap350864, 22.0 ap350908, 22.0 ap350969, 22.0 ap351199, 22.0 ap351223, 22.0 ap351246, 22.0 ap351345, 22.0 ap351527, 22.0 ap351727, 22.0 ap351744, 22.0 ap351942, 22.0 ap352184, 22.0 ap352203, 22.0 ap352264, 22.0 ap352323, 22.0 ap352369, 22.0 ap352423, 22.0 ap352511, 22.0 ap352697, 22.0 ap352711, 22.0 ap352804, 22.0 ap352805, 22.0 ap352824, 22.0 ap352915, 22.0 ap352954, 22.0 ap353001, 22.0 ap353122, 22.0 ap353137, 22.0 ap353167, 22.0 ap353168, 22.0 ap353354, 22.0 ap353389, 22.0 ap353623, 22.0 ap353658, 22.0 ap353708, 22.0 ap353812, 22.0 ap353836, 22.0 ap353839, 22.0 ap353852, 22.0 ap353856, 22.0 ap353870, 22.0 ap353985, 22.0 ap354005, 22.0 ap354077, 22.0 ap354164, 22.0 ap354170, 22.0 ap354180, 22.0 ap354195, 22.0 ap354200, 22.0 ap354316, 22.0 ap354365, 22.0 ap354380, 22.0 ap354415, 22.0 ap354438, 22.0 ap354439, 22.0 ap354535, 22.0 ap354556, 22.0 ap354616, 22.0 ap354681, 22.0 ap354942, 22.0 ap355002, 22.0 ap355003, 22.0 ap355069, 22.0 ap355102, 22.0 ap355112, 22.0 ap355121, 22.0 ap355124, 22.0 ap355125, 22.0 ap355197, 22.0 ap355201, 22.0 ap355236, 22.0 ap355265, 22.0 ap355283, 22.0 ap355356, 22.0 ap355568, 22.0 ap355599, 22.0 ap355628, 22.0 ap355637, 22.0 ap355639, 22.0 ap355640, 22.0 ap355664, 22.0 ap355669, 22.0 ap355670, 22.0 ap355806, 22.0 ap355820, 22.0 ap355833, 22.0 ap355836, 22.0 ap355838, 22.0 ap355896, 22.0 ap355897, 22.0 ap356007, 22.0 ap356029, 22.0 ap356141, 22.0 ap356142, 22.0 ap356152, 22.0 ap356231, 22.0 ap356254, 22.0 ap356301, 22.0 ap356320, 22.0 ap356345, 22.0 ap356353, 22.0 ap356497, 22.0 ap356527, 22.0 ap356570, 22.0 ap356575, 22.0 ap356589, 22.0 ap356707, 22.0 ap356752, 22.0 ap356935, 22.0 ap356969, 22.0 ap356978, 22.0 ap357019, 22.0 ap357029, 22.0 ap357039, 22.0 ap357081, 22.0 ap357105, 22.0 ap357162, 22.0 ap357172, 22.0 ap357181, 22.0 ap357185, 22.0 ap357330, 22.0 ap357366, 22.0 ap357387, 22.0 ap357405, 22.0 ap357413, 22.0 ap357417, 22.0 ap357452, 22.0 ap357454, 22.0 ap357507, 22.0 ap357508, 22.0 ap357610, 22.0 ap357624, 22.0 ap357653, 22.0 ap357670, 22.0 ap357675, 22.0 ap357761, 22.0 ap357889, 22.0 ap357915, 22.0 ap357917, 22.0 ap358012, 22.0 ap358046, 22.0 ap358082, 22.0 ap358096, 22.0 ap358128, 22.0 ap358241, 22.0 ap358271, 22.0 ap358330, 22.0 ap358360, 22.0 ap358365, 22.0 ap358440, 22.0 ap358441, 22.0 ap358513, 22.0 ap358521, 22.0 ap358568, 22.0 ap358604, 22.0 ap358643, 22.0 ap358651, 22.0 ap358681, 22.0 ap358707, 22.0 ap358730, 22.0 ap358732, 22.0 ap358737, 22.0 ap358845, 22.0 ap358870, 22.0 ap358891, 22.0 ap358901, 22.0 ap358907, 22.0 ap358920, 22.0 ap358942, 22.0 ap358943, 22.0 ap358944, 22.0 ap359044, 22.0 ap359118, 22.0 ap359130, 22.0 ap359153, 22.0 ap359164, 22.0 ap359186, 22.0 ap359191, 22.0 ap359225, 22.0 ap359259, 22.0 ap359292, 22.0 ap359298, 22.0 ap359324, 22.0 ap359421, 22.0 ap359424, 22.0 ap359429, 22.0 ap359458, 22.0 ap359464, 22.0 ap359492, 22.0 ap359562, 22.0 ap359570, 22.0 ap359612, 22.0 ap359657, 22.0 ap359710, 22.0 ap359772, 22.0 ap359775, 22.0 ap359812, 22.0 ap359826, 22.0 ap359851, 22.0 ap359892, 22.0 ap359925, 22.0 ap360167, 22.0 ap360198, 22.0 ap360231, 22.0 ap360245, 22.0 ap360319, 22.0 ap360375, 22.0 ap360563, 22.0 ap360603, 22.0 ap360627, 22.0 ap360790, 22.0 ap360874, 22.0 ap360943, 22.0 ap360955, 22.0 ap361062, 22.0 ap361080, 22.0 ap361379, 22.0 ap361414, 22.0 ap361444, 22.0 ap361453, 22.0 ap361459, 22.0 ap361519, 22.0 ap361537, 22.0 ap361549, 22.0 ap361551, 22.0 ap361581, 22.0 ap361596, 22.0 ap361620, 22.0 ap361631, 22.0 ap361640, 22.0 ap361643, 22.0 ap361679, 22.0 ap361691, 22.0 ap361823, 22.0 ap361831, 22.0 ap361847, 22.0 ap361930, 22.0 ap361936, 22.0 ap361997, 22.0 ap361999, 22.0 ap362015, 22.0 ap362019, 22.0 ap362041, 22.0 ap362080, 22.0 ap362120, 22.0 ap362128, 22.0 ap362141, 22.0 ap362193, 22.0 ap362263, 22.0 ap362269, 22.0 ap362314, 22.0 ap362316, 22.0 ap362324, 22.0 ap362363, 22.0 ap362365, 22.0 ap362368, 22.0 ap362372, 22.0 ap362389, 22.0 ap362525, 22.0 ap362677, 22.0 ap362681, 22.0 ap362691, 22.0 ap362693, 22.0 ap362712, 22.0 ap362741, 22.0 ap362766, 22.0 ap362769, 22.0 ap362868, 22.0 ap363023, 22.0 ap363130, 22.0 ap363136, 22.0 ap363197, 22.0 ap363208, 22.0 ap363221, 22.0 ap363240, 22.0 ap363247, 22.0 ap363297, 22.0 ap363298, 22.0 ap363305, 22.0 ap363330, 22.0 ap363412, 22.0 ap363415, 22.0 ap363431, 22.0 ap363433, 22.0 ap363530, 22.0 ap363556, 22.0 ap363560, 22.0 ap363565, 22.0 ap363577, 22.0 ap363609, 22.0 ap363641, 22.0 ap363672, 22.0 ap363691, 22.0 ap363693, 22.0 ap363694, 22.0 ap363705, 22.0 ap363707, 22.0 ap363710, 22.0 ap363727, 22.0 ap363811, 22.0 ap363844, 22.0 ap363845, 22.0 ap363984, 22.0 ap364003, 22.0 ap364030, 22.0 ap364100, 22.0 ap364101, 22.0 ap364107, 22.0 ap364113, 22.0 ap364146, 22.0 ap364148, 22.0 ap364150, 22.0 ap364154, 22.0 ap364157, 22.0 ap364210, 22.0 ap364241, 22.0 ap364248, 22.0 ap364252, 22.0 ap364260, 22.0 ap364347, 22.0 ap364357, 22.0 ap364385, 22.0 ap364483, 22.0 ap364532, 22.0 ap364562, 22.0 ap364582, 22.0 ap364598, 22.0 ap364611, 22.0 ap364617, 22.0 ap364621, 22.0 ap364628, 22.0 ap364634, 22.0 ap364636, 22.0 ap364705, 22.0 ap364755, 22.0 ap364825, 22.0 ap365040, 22.0 ap365044, 22.0 ap365090, 22.0 ap365186, 22.0 ap365227, 22.0 ap365257, 22.0 ap365357, 22.0 ap365530, 22.0 ap365531, 22.0 ap365598, 22.0 ap365633, 22.0 ap365639, 22.0 ap365640, 22.0 ap365646, 22.0 ap365661, 22.0 ap365689, 22.0 ap365701, 22.0 ap365770, 22.0 ap365771, 22.0 ap365798, 22.0 ap365832, 22.0 ap365900, 22.0 ap365984, 22.0 ap366013, 22.0 ap366179, 22.0 ap366264, 22.0 ap366321, 22.0 ap366334, 22.0 ap366346, 22.0 ap366366, 22.0 ap366390, 22.0 ap366661, 22.0 ap366748, 22.0 ap366834, 22.0 ap366835, 22.0 ap366836, 22.0 ap366879, 22.0 ap366905, 22.0 ap366917, 22.0 ap366940, 22.0 ap366968, 22.0 ap366982, 22.0 ap366984, 22.0 ap366986, 22.0 ap366992, 22.0 ap366997, 22.0 ap367006, 22.0 ap367222, 22.0 ap367223, 22.0 ap367233, 22.0 ap367263, 22.0 ap384120, 22.0 ap367292, 22.0 ap367307, 22.0 ap367323, 22.0 ap367324, 22.0 ap367325, 22.0 ap367335, 22.0 ap367356, 22.0 ap367413, 22.0 ap367436, 22.0 ap367451, 22.0 ap367487, 22.0 ap367488, 22.0 ap367501, 22.0 ap367547, 22.0 ap367781, 22.0 ap367810, 22.0 ap367816, 22.0 ap367857, 22.0 ap367893, 22.0 ap367895, 22.0 ap367985, 22.0 ap367991, 22.0 ap367992, 22.0 ap368000, 22.0 ap368057, 22.0 ap368073, 22.0 ap368127, 22.0 ap368163, 22.0 ap368179, 22.0 ap368196, 22.0 ap368214, 22.0 ap368350, 22.0 ap368408, 22.0 ap368437, 22.0 ap368485, 22.0 ap368517, 22.0 ap368590, 22.0 ap368605, 22.0 ap368613, 22.0 ap368643, 22.0 ap368651, 22.0 ap368725, 22.0 ap368743, 22.0 ap368854, 22.0 ap368933, 22.0 ap369012, 22.0 ap369052, 22.0 ap369078, 22.0 ap369087, 22.0 ap369127, 22.0 ap369136, 22.0 ap369179, 22.0 ap369256, 22.0 ap369300, 22.0 ap369316, 22.0 ap369469, 22.0 ap369470, 22.0 ap369472, 22.0 ap369474, 22.0 ap369476, 22.0 ap369477, 22.0 ap369479, 22.0 ap369535, 22.0 ap369595, 22.0 ap369608, 22.0 ap369619, 22.0 ap369624, 22.0 ap369680, 22.0 ap369710, 22.0 ap369716, 22.0 ap369724, 22.0 ap369730, 22.0 ap369757, 22.0 ap369763, 22.0 ap369770, 22.0 ap369775, 22.0 ap369779, 22.0 ap369784, 22.0 ap369877, 22.0 ap369878, 22.0 ap369883, 22.0 ap369884, 22.0 ap369885, 22.0 ap369902, 22.0 ap369903, 22.0 ap369928, 22.0 ap370040, 22.0 ap370085, 22.0 ap370088, 22.0 ap370093, 22.0 ap370199, 22.0 ap370246, 22.0 ap370300, 22.0 ap370307, 22.0 ap370326, 22.0 ap370328, 22.0 ap370362, 22.0 ap370383, 22.0 ap370426, 22.0 ap370442, 22.0 ap370464, 22.0 ap370479, 22.0 ap370537, 22.0 ap370539, 22.0 ap370578, 22.0 ap370603, 22.0 ap370620, 22.0 ap370662, 22.0 ap370676, 22.0 ap370707, 22.0 ap370720, 22.0 ap370735, 22.0 ap370739, 22.0 ap370763, 22.0 ap370777, 22.0 ap370786, 22.0 ap370801, 22.0 ap370907, 22.0 ap370909, 22.0 ap370918, 22.0 ap370935, 22.0 ap371021, 22.0 ap371024, 22.0 ap371052, 22.0 ap371056, 22.0 ap371091, 22.0 ap371099, 22.0 ap371151, 22.0 ap371233, 22.0 ap371246, 22.0 ap371254, 22.0 ap371258, 22.0 ap371259, 22.0 ap371261, 22.0 ap371269, 22.0 ap371291, 22.0 ap371301, 22.0 ap371310, 22.0 ap371327, 22.0 ap371368, 22.0 ap371423, 22.0 ap371459, 22.0 ap371490, 22.0 ap371500, 22.0 ap371529, 22.0 ap371539, 22.0 ap371543, 22.0 ap371557, 22.0 ap371604, 22.0 ap371605, 22.0 ap371669, 22.0 ap371733, 22.0 ap371768, 22.0 ap371772, 22.0 ap371779, 22.0 ap371793, 22.0 ap371835, 22.0 ap371886, 22.0 ap371917, 22.0 ap371922, 22.0 ap371935, 22.0 ap371945, 22.0 ap371996, 22.0 ap371998, 22.0 ap372011, 22.0 ap372068, 22.0 ap372085, 22.0 ap372115, 22.0 ap372211, 22.0 ap372286, 22.0 ap372292, 22.0 ap372397, 22.0 ap372405, 22.0 ap372432, 22.0 ap372464, 22.0 ap372475, 22.0 ap372502, 22.0 ap372505, 22.0 ap372508, 22.0 ap372510, 22.0 ap372561, 22.0 ap372574, 22.0 ap372588, 22.0 ap372617, 22.0 ap372633, 22.0 ap372655, 22.0 ap372696, 22.0 ap372821, 22.0 ap372890, 22.0 ap372910, 22.0 ap372929, 22.0 ap372942, 22.0 ap372943, 22.0 ap372989, 22.0 ap373001, 22.0 ap373009, 22.0 ap373017, 22.0 ap373097, 22.0 ap373146, 22.0 ap373173, 22.0 ap373174, 22.0 ap373180, 22.0 ap373182, 22.0 ap373197, 22.0 ap373239, 22.0 ap373256, 22.0 ap373300, 22.0 ap373330, 22.0 ap373332, 22.0 ap373336, 22.0 ap373339, 22.0 ap373340, 22.0 ap373358, 22.0 ap373392, 22.0 ap373412, 22.0 ap373480, 22.0 ap373511, 22.0 ap373521, 22.0 ap373534, 22.0 ap373565, 22.0 ap373584, 22.0 ap373589, 22.0 ap373622, 22.0 ap373649, 22.0 ap373711, 22.0 ap373717, 22.0 ap373769, 22.0 ap373783, 22.0 ap373870, 22.0 ap373872, 22.0 ap373881, 22.0 ap373914, 22.0 ap373952, 22.0 ap373958, 22.0 ap374037, 22.0 ap374055, 22.0 ap374085, 22.0 ap374109, 22.0 ap374135, 22.0 ap374144, 22.0 ap374145, 22.0 ap374162, 22.0 ap374165, 22.0 ap374211, 22.0 ap374226, 22.0 ap374249, 22.0 ap374255, 22.0 ap374270, 22.0 ap374286, 22.0 ap374294, 22.0 ap374296, 22.0 ap374305, 22.0 ap374310, 22.0 ap374311, 22.0 ap374315, 22.0 ap374361, 22.0 ap374414, 22.0 ap374421, 22.0 ap374454, 22.0 ap374472, 22.0 ap374493, 22.0 ap374498, 22.0 ap374528, 22.0 ap374530, 22.0 ap374548, 22.0 ap374583, 22.0 ap374605, 22.0 ap374609, 22.0 ap374641, 22.0 ap374643, 22.0 ap374691, 22.0 ap374695, 22.0 ap374723, 22.0 ap374785, 22.0 ap374793, 22.0 ap374794, 22.0 ap374820, 22.0 ap374832, 22.0 ap374869, 22.0 ap374892, 22.0 ap374917, 22.0 ap374935, 22.0 ap374943, 22.0 ap374956, 22.0 ap375004, 22.0 ap375021, 22.0 ap375036, 22.0 ap375039, 22.0 ap375041, 22.0 ap375205, 22.0 ap375207, 22.0 ap375210, 22.0 ap375214, 22.0 ap375240, 22.0 ap375260, 22.0 ap375270, 22.0 ap375273, 22.0 ap375289, 22.0 ap375293, 22.0 ap375317, 22.0 ap375335, 22.0 ap375342, 22.0 ap375351, 22.0 ap375353, 22.0 ap375370, 22.0 ap375398, 22.0 ap375409, 22.0 ap375412, 22.0 ap375414, 22.0 ap375421, 22.0 ap375424, 22.0 ap375425, 22.0 ap375430, 22.0 ap375432, 22.0 ap375453, 22.0 ap375469, 22.0 ap375484, 22.0 ap375488, 22.0 ap375489, 22.0 ap375514, 22.0 ap375515, 22.0 ap375518, 22.0 ap375539, 22.0 ap375603, 22.0 ap375624, 22.0 ap375650, 22.0 ap375700, 22.0 ap375711, 22.0 ap375748, 22.0 ap375756, 22.0 ap375757, 22.0 ap375785, 22.0 ap375787, 22.0 ap375804, 22.0 ap375828, 22.0 ap375849, 22.0 ap375860, 22.0 ap375902, 22.0 ap375950, 22.0 ap375959, 22.0 ap375982, 22.0 ap375989, 22.0 ap375996, 22.0 ap376012, 22.0 ap376024, 22.0 ap376042, 22.0 ap376099, 22.0 ap376156, 22.0 ap376189, 22.0 ap376205, 22.0 ap376213, 22.0 ap376220, 22.0 ap376317, 22.0 ap376373, 22.0 ap376384, 22.0 ap376387, 22.0 ap376414, 22.0 ap376445, 22.0 ap376486, 22.0 ap376512, 22.0 ap376529, 22.0 ap376594, 22.0 ap376613, 22.0 ap376622, 22.0 ap376666, 22.0 ap376696, 22.0 ap376699, 22.0 ap376704, 22.0 ap376722, 22.0 ap376736, 22.0 ap376787, 22.0 ap376798, 22.0 ap376809, 22.0 ap376818, 22.0 ap376820, 22.0 ap376878, 22.0 ap376889, 22.0 ap376934, 22.0 ap376945, 22.0 ap376956, 22.0 ap376979, 22.0 ap377033, 22.0 ap377050, 22.0 ap377091, 22.0 ap377109, 22.0 ap377120, 22.0 ap377163, 22.0 ap377175, 22.0 ap377177, 22.0 ap377229, 22.0 ap377319, 22.0 ap377423, 22.0 ap377505, 22.0 ap377517, 22.0 ap377538, 22.0 ap377555, 22.0 ap377569, 22.0 ap377630, 22.0 ap377670, 22.0 ap377687, 22.0 ap377718, 22.0 ap377723, 22.0 ap377737, 22.0 ap377751, 22.0 ap377868, 22.0 ap377878, 22.0 ap377888, 22.0 ap377966, 22.0 ap377986, 22.0 ap378014, 22.0 ap378029, 22.0 ap378047, 22.0 ap378051, 22.0 ap378070, 22.0 ap378087, 22.0 ap378122, 22.0 ap378141, 22.0 ap378142, 22.0 ap378144, 22.0 ap378154, 22.0 ap378168, 22.0 ap378178, 22.0 ap378227, 22.0 ap378234, 22.0 ap378242, 22.0 ap378248, 22.0 ap378258, 22.0 ap378372, 22.0 ap378383, 22.0 ap378390, 22.0 ap378415, 22.0 ap378481, 22.0 ap378535, 22.0 ap378553, 22.0 ap378575, 22.0 ap378595, 22.0 ap378818, 22.0 ap378827, 22.0 ap378886, 22.0 ap378902, 22.0 ap378913, 22.0 ap378920, 22.0 ap378952, 22.0 ap378985, 22.0 ap378991, 22.0 ap378995, 22.0 ap379091, 22.0 ap379105, 22.0 ap379112, 22.0 ap379140, 22.0 ap379152, 22.0 ap379168, 22.0 ap379187, 22.0 ap379190, 22.0 ap379327, 22.0 ap379339, 22.0 ap379346, 22.0 ap379373, 22.0 ap379390, 22.0 ap379391, 22.0 ap379411, 22.0 ap379423, 22.0 ap379449, 22.0 ap379501, 22.0 ap379511, 22.0 ap379532, 22.0 ap379533, 22.0 ap379535, 22.0 ap379600, 22.0 ap379616, 22.0 ap379627, 22.0 ap379635, 22.0 ap379781, 22.0 ap379830, 22.0 ap379855, 22.0 ap379903, 22.0 ap379921, 22.0 ap379925, 22.0 ap379957, 22.0 ap379963, 22.0 ap380109, 22.0 ap380249, 22.0 ap380256, 22.0 ap380264, 22.0 ap380282, 22.0 ap380355, 22.0 ap380375, 22.0 ap380465, 22.0 ap380581, 22.0 ap380608, 22.0 ap380692, 22.0 ap380758, 22.0 ap380762, 22.0 ap380766, 22.0 ap380772, 22.0 ap380775, 22.0 ap380782, 22.0 ap380802, 22.0 ap380840, 22.0 ap380939, 22.0 ap381051, 22.0 ap381078, 22.0 ap381081, 22.0 ap381108, 22.0 ap381247, 22.0 ap381269, 22.0 ap381292, 22.0 ap381300, 22.0 ap381334, 22.0 ap381339, 22.0 ap381358, 22.0 ap381385, 22.0 ap381398, 22.0 ap381543, 22.0 ap381570, 22.0 ap381575, 22.0 ap381596, 22.0 ap381600, 22.0 ap381611, 22.0 ap381616, 22.0 ap381621, 22.0 ap381623, 22.0 ap381624, 22.0 ap381657, 22.0 ap381734, 22.0 ap381775, 22.0 ap381809, 22.0 ap381825, 22.0 ap381878, 22.0 ap382231, 22.0 ap382412, 22.0 ap382441, 22.0 ap382691, 22.0 ap382692, 22.0 ap382836, 22.0 ap382869, 22.0 ap382873, 22.0 ap382894, 22.0 ap382929, 22.0 ap382935, 22.0 ap382965, 22.0 ap382969, 22.0 ap382994, 22.0 ap383105, 22.0 ap383126, 22.0 ap383147, 22.0 ap383178, 22.0 ap383188, 22.0 ap383331, 22.0 ap383682, 22.0 ap343927, 22.0 ap349384, 22.0 ap351855, 22.0 ap352320, 22.0 ap352383, 22.0 ap352728, 22.0 ap353499, 22.0 ap353509, 22.0 ap354557, 22.0 ap355638, 22.0 ap355673, 22.0 ap355699, 22.0 ap355825, 22.0 ap356161, 22.0 ap356256, 22.0 ap356503, 22.0 ap356584, 22.0 ap357161, 22.0 ap358019, 22.0 ap358137, 22.0 ap358442, 22.0 ap359252, 22.0 ap359959, 22.0 ap360228, 22.0 ap360317, 22.0 ap361456, 22.0 ap361534, 22.0 ap361580, 22.0 ap361863, 22.0 ap362378, 22.0 ap363392, 22.0 ap363597, 22.0 ap364020, 22.0 ap364158, 22.0 ap364667, 22.0 ap365125, 22.0 ap365232, 22.0 ap365659, 22.0 ap366171, 22.0 ap366184, 22.0 ap366306, 22.0 ap366330, 22.0 ap366646, 22.0 ap366653, 22.0 ap366731, 22.0 ap367986, 22.0 ap368137, 22.0 ap369738, 22.0 ap369788, 22.0 ap369922, 22.0 ap370075, 22.0 ap370659, 22.0 ap370680, 22.0 ap370828, 22.0 ap371030, 22.0 ap371043, 22.0 ap371049, 22.0 ap371495, 22.0 ap371771, 22.0 ap371804, 22.0 ap371821, 22.0 ap371966, 22.0 ap372075, 22.0 ap372517, 22.0 ap372657, 22.0 ap373722, 22.0 ap374274, 22.0 ap374295, 22.0 ap374475, 22.0 ap374649, 22.0 ap374818, 22.0 ap374995, 22.0 ap375060, 22.0 ap375089, 22.0 ap375308, 22.0 ap375435, 22.0 ap376286, 22.0 ap376630, 22.0 ap377126, 22.0 ap377398, 22.0 ap378401, 22.0 ap378426, 22.0 ap379191, 22.0 ap379396, 22.0 ap379548, 22.0 ap379852, 22.0 ap380528, 22.0 ap380787, 22.0 ap380841, 22.0 ap380854, 22.0 ap381080, 22.0 ap381723, 22.0 ap381725, 22.0 ap381729, 22.0 ap382095, 22.0 ap382435, 22.0 ap382849, 22.0 ap383335, 22.0 ap383560, 22.0 ap343282, 22.0 ap345686, 22.0 ap345827, 22.0 ap350300, 22.0 ap350919, 22.0 ap351606, 22.0 ap351856, 22.0 ap351951, 22.0 ap352244, 22.0 ap352410, 22.0 ap352424, 22.0 ap352832, 22.0 ap353022, 22.0 ap353582, 22.0 ap353796, 22.0 ap353945, 22.0 ap354068, 22.0 ap354387, 22.0 ap354468, 22.0 ap354476, 22.0 ap354581, 22.0 ap354651, 22.0 ap354669, 22.0 ap354688, 22.0 ap354945, 22.0 ap354977, 22.0 ap355019, 22.0 ap355119, 22.0 ap355603, 22.0 ap355663, 22.0 ap355772, 22.0 ap355834, 22.0 ap356159, 22.0 ap356168, 22.0 ap356352, 22.0 ap356392, 22.0 ap356420, 22.0 ap356435, 22.0 ap356514, 22.0 ap356515, 22.0 ap356585, 22.0 ap356755, 22.0 ap356847, 22.0 ap356899, 22.0 ap357009, 22.0 ap357186, 22.0 ap357188, 22.0 ap357377, 22.0 ap357499, 22.0 ap357509, 22.0 ap357561, 22.0 ap357651, 22.0 ap357679, 22.0 ap357698, 22.0 ap357730, 22.0 ap357820, 22.0 ap357874, 22.0 ap358131, 22.0 ap358341, 22.0 ap358550, 22.0 ap358854, 22.0 ap358885, 22.0 ap358972, 22.0 ap359104, 22.0 ap359226, 22.0 ap359305, 22.0 ap359423, 22.0 ap359625, 22.0 ap359676, 22.0 ap359703, 22.0 ap359753, 22.0 ap359961, 22.0 ap359967, 22.0 ap360149, 22.0 ap360225, 22.0 ap360241, 22.0 ap360256, 22.0 ap360277, 22.0 ap360326, 22.0 ap360353, 22.0 ap360367, 22.0 ap360408, 22.0 ap360422, 22.0 ap360491, 22.0 ap360544, 22.0 ap360631, 22.0 ap360743, 22.0 ap360788, 22.0 ap360848, 22.0 ap360858, 22.0 ap360996, 22.0 ap361017, 22.0 ap361046, 22.0 ap361091, 22.0 ap361124, 22.0 ap361278, 22.0 ap361411, 22.0 ap361449, 22.0 ap361508, 22.0 ap361725, 22.0 ap361830, 22.0 ap361868, 22.0 ap362144, 22.0 ap362232, 22.0 ap362282, 22.0 ap362608, 22.0 ap362639, 22.0 ap362827, 22.0 ap362828, 22.0 ap362970, 22.0 ap363037, 22.0 ap363064, 22.0 ap363176, 22.0 ap363300, 22.0 ap363333, 22.0 ap363576, 22.0 ap363578, 22.0 ap363599, 22.0 ap363639, 22.0 ap363777, 22.0 ap363813, 22.0 ap363814, 22.0 ap364076, 22.0 ap364118, 22.0 ap364189, 22.0 ap364541, 22.0 ap364609, 22.0 ap364772, 22.0 ap364904, 22.0 ap365057, 22.0 ap365127, 22.0 ap365240, 22.0 ap365419, 22.0 ap365542, 22.0 ap365574, 22.0 ap365863, 22.0 ap365907, 22.0 ap365914, 22.0 ap365960, 22.0 ap366462, 22.0 ap366611, 22.0 ap366692, 22.0 ap367322, 22.0 ap367887, 22.0 ap368002, 22.0 ap368021, 22.0 ap368154, 22.0 ap368238, 22.0 ap368307, 22.0 ap368387, 22.0 ap368452, 22.0 ap368919, 22.0 ap369098, 22.0 ap369144, 22.0 ap369190, 22.0 ap369581, 22.0 ap369727, 22.0 ap369869, 22.0 ap369925, 22.0 ap369994, 22.0 ap370158, 22.0 ap370251, 22.0 ap370255, 22.0 ap370476, 22.0 ap370673, 22.0 ap370810, 22.0 ap370888, 22.0 ap370922, 22.0 ap371130, 22.0 ap371132, 22.0 ap371140, 22.0 ap371165, 22.0 ap371272, 22.0 ap371316, 22.0 ap371442, 22.0 ap371558, 22.0 ap371658, 22.0 ap371773, 22.0 ap371885, 22.0 ap372295, 22.0 ap372296, 22.0 ap372439, 22.0 ap372523, 22.0 ap372581, 22.0 ap373024, 22.0 ap373113, 22.0 ap373128, 22.0 ap373198, 22.0 ap373259, 22.0 ap373297, 22.0 ap373348, 22.0 ap373781, 22.0 ap373794, 22.0 ap374199, 22.0 ap374251, 22.0 ap374309, 22.0 ap374340, 22.0 ap374346, 22.0 ap374353, 22.0 ap374510, 22.0 ap374669, 22.0 ap374712, 22.0 ap374732, 22.0 ap374787, 22.0 ap375007, 22.0 ap375108, 22.0 ap375148, 22.0 ap375219, 22.0 ap375328, 22.0 ap375384, 22.0 ap375418, 22.0 ap375500, 22.0 ap375686, 22.0 ap375741, 22.0 ap375850, 22.0 ap375958, 22.0 ap376309, 22.0 ap376358, 22.0 ap376653, 22.0 ap376799, 22.0 ap376849, 22.0 ap376854, 22.0 ap376875, 22.0 ap377013, 22.0 ap377038, 22.0 ap377110, 22.0 ap377169, 22.0 ap377206, 22.0 ap377270, 22.0 ap377278, 22.0 ap377867, 22.0 ap377974, 22.0 ap378077, 22.0 ap378212, 22.0 ap378255, 22.0 ap378864, 22.0 ap378900, 22.0 ap379068, 22.0 ap379086, 22.0 ap379116, 22.0 ap379125, 22.0 ap379201, 22.0 ap379412, 22.0 ap379445, 22.0 ap379496, 22.0 ap379575, 22.0 ap379792, 22.0 ap379844, 22.0 ap380061, 22.0 ap380113, 22.0 ap380119, 22.0 ap380165, 22.0 ap380178, 22.0 ap380191, 22.0 ap380254, 22.0 ap380268, 22.0 ap380368, 22.0 ap380408, 22.0 ap380454, 22.0 ap380526, 22.0 ap380789, 22.0 ap380793, 22.0 ap380844, 22.0 ap380992, 22.0 ap381241, 22.0 ap381561, 22.0 ap382699, 22.0 ap382854, 22.0 ap382901, 22.0 ap382920, 22.0 ap382924, 22.0 ap382941, 22.0 ap383113, 22.0 ap383132, 22.0 ap383164, 22.0 ap383241, 22.0 ap383300, 22.0 ap383549, 22.0 ap384011, 22.0 ap384360, 22.0 ap384475, 22.0 ap384743, 22.0 ap353444, 22.0 ap353632, 22.0 ap350187, 22.0 ap353539, 22.0 ap352800, 22.0 ap356703, 22.0 ap358658, 22.0 ap358739, 22.0 ap356536, 22.0 ap356545, 22.0 ap358408, 22.0 ap354381, 22.0 ap358405, 22.0 ap355105, 22.0 ap354430, 22.0 ap354212, 22.0 ap360594, 22.0 ap359426, 22.0 ap359294, 22.0 ap355360, 22.0 ap357667, 22.0 ap361976, 22.0 ap361489, 22.0 ap362018, 22.0 ap364067, 22.0 ap361663, 22.0 ap366466, 22.0 ap364587, 22.0 ap366628, 22.0 ap364700, 22.0 ap367017, 22.0 ap360864, 22.0 ap365131, 22.0 ap360834, 22.0 ap370195, 22.0 ap368900, 22.0 ap367639, 22.0 ap370076, 22.0 ap373248, 22.0 ap378912, 22.0 ap383380, 22.0 ap380990, 22.0 ap380155, 22.0 ap381882, 21.sp1 ap369142, 21.sp1 ap375408, 21.sp1 ap377071, 21.sp1, 21.sp1 ap369107, 21.sp1 ap377180, 21.sp1 ap377373, 21.sp1 ap376191, 21.sp1 ap379534, 21.sp1 ap379554, 21.sp1 ap379844, 21.sp1 ap380524, 21.sp1 ap380755, 21.sp1 ap381935, 21.sp1 ap381827, 21.sp1 ap359433, 21.sp1 ap375292, 21.sp1 ap373113, 21.sp1 ap350491, 21.sp1 ap351294, 21.sp1 ap351704, 21.sp1 ap352726, 21.sp1 ap349996, 21.sp1 ap350763, 21.sp1 ap356747, 21.sp1 ap349210, 21.sp1 ap346622, 21.sp1 ap350110, 21.sp1 ap350420, 21.sp1 ap351795, 21.sp1 ap359119, 21.sp1 ap348753, 21.sp1 ap350338, 21.sp1 ap383143, 21.sp1 ap350204, 21.sp1 ap373597, 21.sp1 ap346386, 21.sp1 ap351961, 21.sp1 ap357571, 21.sp1 ap356159, 21.sp1 ap376314, 21.sp1 ap352109, 21.sp1 ap350308, 21.sp1 ap351160, 21.sp1 ap383140, 21.sp1 ap371921, 21.sp1 ap374679, 21.sp1 ap363301, 21.sp1 ap348143, 21.sp1 ap351216, 21.sp1 ap361590, 21.sp1 ap361308, 21.sp1 ap370196, 21.sp1 ap366880, 21.sp1 ap369219, 21.sp1 ap371165, 21.sp1 ap353354, 21.sp1 ap350379, 21.sp1 ap339376, 21.sp1 ap345633, 21.sp1 ap343282, 21.sp1 ap351466, 21.sp1 ap380394, 21.sp1 ap375274, 21.sp1 ap372454, 21.sp1 ap344033, 21.sp1 ap343495, 21.sp1 ap344020, 21.sp1 ap370636, 21.sp1 ap341601, 21.sp1 ap341596, 21.sp1 ap358132, 21.sp1 ap351411, 21.sp1 ap343579, 21.sp1 ap243992, 21.sp1 ap374978, 21.sp1 ap343675, 21.sp1 ap355717, 21.sp1 ap354068, 21.sp1 ap355107, 21.sp1 ap344422, 21.sp1 ap355581, 21.sp1 ap354785, 21.sp1 ap349872, 21.sp1 ap375465, 21.sp1 ap353842, 21.sp1 ap347603, 21.sp1 ap345013, 21.sp1 ap379904, 21.sp1 ap367109, 21.sp1 ap344752, 21.sp1 ap346074, 21.sp1 ap375505, 21.sp1 ap346379, 21.sp1 ap366486, 21.sp1 ap345261, 21.sp1 ap339781, 21.sp1 ap381233, 21.sp1 ap366298, 21.sp1 ap373102, 21.sp1 ap371926, 21.sp1 ap367732, 21.sp1 ap366370, 21.sp1 ap374519, 21.sp1 ap377713, 21.sp1 ap235988, 21.sp1 ap381965, 21.sp1 ap215990, 21.sp1 ap233247, 21.sp1 ap233913, 21.sp1 ap235252, 21.sp1 ap235960, 21.sp1 ap242300, 21.sp1 ap243808, 21.sp1 ap244020, 21.sp1 ap244265, 21.sp1 ap244609, 21.sp1 ap245148, 21.sp1 ap245441, 21.sp1 ap245468, 21.sp1 ap246072, 21.sp1 ap246656, 21.sp1 ap247533, 21.sp1 ap338833, 21.sp1 ap338964, 21.sp1 ap338965, 21.sp1 ap338972, 21.sp1 ap338988, 21.sp1 ap339196, 21.sp1 ap339200, 21.sp1 ap339206, 21.sp1 ap339209, 21.sp1 ap339236, 21.sp1 ap339342, 21.sp1 ap339346, 21.sp1 ap339351, 21.sp1 ap339395, 21.sp1 ap339477, 21.sp1 ap339538, 21.sp1 ap339552, 21.sp1 ap339568, 21.sp1 ap339658, 21.sp1 ap339897, 21.sp1 ap340054, 21.sp1 ap340168, 21.sp1 ap341350, 21.sp1 ap341471, 21.sp1 ap341498, 21.sp1 ap341577, 21.sp1 ap341645, 21.sp1 ap341663, 21.sp1 ap341897, 21.sp1 ap341939, 21.sp1 ap342028, 21.sp1 ap342127, 21.sp1 ap342138, 21.sp1 ap342145, 21.sp1 ap342175, 21.sp1 ap342217, 21.sp1 ap342284, 21.sp1 ap342324, 21.sp1 ap342461, 21.sp1 ap342474, 21.sp1 ap342483, 21.sp1 ap342543, 21.sp1 ap342548, 21.sp1 ap342588, 21.sp1 ap342625, 21.sp1 ap342669, 21.sp1 ap342696, 21.sp1 ap342719, 21.sp1 ap342755, 21.sp1 ap342771, 21.sp1 ap342782, 21.sp1 ap342792, 21.sp1 ap342836, 21.sp1 ap342853, 21.sp1 ap342946, 21.sp1 ap342975, 21.sp1 ap343017, 21.sp1 ap343229, 21.sp1 ap343351, 21.sp1 ap343352, 21.sp1 ap343410, 21.sp1 ap343445, 21.sp1 ap343616, 21.sp1 ap343877, 21.sp1 ap343883, 21.sp1 ap343999, 21.sp1 ap344043, 21.sp1 ap344052, 21.sp1 ap344083, 21.sp1 ap344094, 21.sp1 ap344100, 21.sp1 ap344238, 21.sp1 ap344253, 21.sp1 ap344270, 21.sp1 ap344290, 21.sp1 ap344479, 21.sp1 ap344485, 21.sp1 ap344600, 21.sp1 ap344681, 21.sp1 ap344945, 21.sp1 ap344952, 21.sp1 ap344954, 21.sp1 ap344964, 21.sp1 ap345054, 21.sp1 ap345059, 21.sp1 ap345069, 21.sp1 ap345246, 21.sp1 ap345293, 21.sp1 ap345452, 21.sp1 ap345456, 21.sp1 ap345490, 21.sp1 ap345549, 21.sp1 ap345627, 21.sp1 ap345628, 21.sp1 ap345729, 21.sp1 ap345732, 21.sp1 ap345738, 21.sp1 ap345755, 21.sp1 ap345850, 21.sp1 ap345873, 21.sp1 ap346064, 21.sp1 ap346076, 21.sp1 ap346128, 21.sp1 ap346129, 21.sp1 ap346183, 21.sp1 ap346233, 21.sp1 ap346253, 21.sp1 ap346261, 21.sp1 ap346307, 21.sp1 ap346337, 21.sp1 ap346347, 21.sp1 ap346376, 21.sp1 ap346554, 21.sp1 ap346559, 21.sp1 ap346562, 21.sp1 ap346577, 21.sp1 ap346607, 21.sp1 ap346632, 21.sp1 ap346639, 21.sp1 ap346646, 21.sp1 ap346719, 21.sp1 ap346724, 21.sp1 ap346734, 21.sp1 ap346764, 21.sp1 ap346900, 21.sp1 ap346902, 21.sp1 ap347016, 21.sp1 ap347158, 21.sp1 ap347172, 21.sp1 ap347239, 21.sp1 ap347246, 21.sp1 ap347302, 21.sp1 ap347506, 21.sp1 ap347507, 21.sp1 ap347534, 21.sp1 ap347548, 21.sp1 ap347562, 21.sp1 ap347640, 21.sp1 ap347676, 21.sp1 ap347741, 21.sp1 ap347896, 21.sp1 ap347905, 21.sp1 ap347930, 21.sp1 ap347959, 21.sp1 ap347966, 21.sp1 ap347975, 21.sp1 ap348014, 21.sp1 ap348037, 21.sp1 ap348078, 21.sp1 ap348089, 21.sp1 ap348093, 21.sp1 ap348100, 21.sp1 ap348104, 21.sp1 ap348107, 21.sp1 ap348136, 21.sp1 ap348156, 21.sp1 ap348160, 21.sp1 ap348364, 21.sp1 ap348431, 21.sp1 ap348462, 21.sp1 ap348472, 21.sp1 ap348527, 21.sp1 ap348531, 21.sp1 ap348564, 21.sp1 ap348660, 21.sp1 ap348740, 21.sp1 ap348878, 21.sp1 ap348891, 21.sp1 ap348945, 21.sp1 ap348952, 21.sp1 ap349011, 21.sp1 ap349023, 21.sp1 ap349056, 21.sp1 ap349066, 21.sp1 ap349206, 21.sp1 ap349222, 21.sp1 ap349390, 21.sp1 ap349443, 21.sp1 ap349486, 21.sp1 ap349589, 21.sp1 ap349617, 21.sp1 ap349621, 21.sp1 ap349631, 21.sp1 ap349642, 21.sp1 ap349699, 21.sp1 ap349703, 21.sp1 ap349717, 21.sp1 ap349724, 21.sp1 ap349850, 21.sp1 ap349863, 21.sp1 ap349864, 21.sp1 ap349867, 21.sp1 ap350050, 21.sp1 ap350090, 21.sp1 ap350111, 21.sp1 ap350135, 21.sp1 ap350141, 21.sp1 ap350143, 21.sp1 ap350179, 21.sp1 ap350189, 21.sp1 ap350303, 21.sp1 ap350347, 21.sp1 ap350403, 21.sp1 ap350456, 21.sp1 ap350465, 21.sp1 ap350474, 21.sp1 ap350497, 21.sp1 ap350573, 21.sp1 ap350591, 21.sp1 ap350822, 21.sp1 ap350832, 21.sp1 ap350838, 21.sp1 ap350859, 21.sp1 ap350884, 21.sp1 ap350916, 21.sp1 ap351014, 21.sp1 ap351034, 21.sp1 ap351248, 21.sp1 ap351263, 21.sp1 ap351295, 21.sp1 ap351487, 21.sp1 ap351495, 21.sp1 ap351530, 21.sp1 ap351644, 21.sp1 ap351700, 21.sp1 ap351701, 21.sp1 ap351721, 21.sp1 ap351754, 21.sp1 ap351835, 21.sp1 ap351894, 21.sp1 ap351898, 21.sp1 ap351934, 21.sp1 ap351951, 21.sp1 ap351988, 21.sp1 ap352082, 21.sp1 ap352087, 21.sp1 ap352205, 21.sp1 ap352246, 21.sp1 ap352340, 21.sp1 ap352372, 21.sp1 ap352402, 21.sp1 ap352421, 21.sp1 ap352515, 21.sp1 ap352766, 21.sp1 ap352795, 21.sp1 ap352896, 21.sp1 ap352969, 21.sp1 ap352972, 21.sp1 ap353022, 21.sp1 ap353403, 21.sp1 ap353406, 21.sp1 ap353418, 21.sp1 ap353464, 21.sp1 ap353520, 21.sp1 ap353549, 21.sp1 ap353582, 21.sp1 ap353689, 21.sp1 ap353701, 21.sp1 ap353839, 21.sp1 ap353841, 21.sp1 ap353843, 21.sp1 ap354050, 21.sp1 ap354052, 21.sp1 ap354069, 21.sp1 ap354090, 21.sp1 ap354098, 21.sp1 ap354180, 21.sp1 ap354331, 21.sp1 ap354355, 21.sp1 ap354413, 21.sp1 ap354454, 21.sp1 ap354469, 21.sp1 ap354474, 21.sp1 ap354494, 21.sp1 ap354531, 21.sp1 ap354559, 21.sp1 ap354646, 21.sp1 ap354669, 21.sp1 ap354688, 21.sp1 ap354707, 21.sp1 ap354789, 21.sp1 ap354793, 21.sp1 ap354918, 21.sp1 ap354927, 21.sp1 ap354936, 21.sp1 ap354964, 21.sp1 ap355000, 21.sp1 ap355003, 21.sp1 ap355027, 21.sp1 ap355091, 21.sp1 ap355095, 21.sp1 ap355385, 21.sp1 ap355616, 21.sp1 ap355663, 21.sp1 ap355774, 21.sp1 ap355855, 21.sp1 ap355875, 21.sp1 ap355883, 21.sp1 ap355894, 21.sp1 ap355904, 21.sp1 ap355912, 21.sp1 ap355914, 21.sp1 ap356145, 21.sp1 ap356164, 21.sp1 ap356231, 21.sp1 ap356271, 21.sp1 ap356317, 21.sp1 ap356328, 21.sp1 ap356375, 21.sp1 ap356458, 21.sp1 ap356474, 21.sp1 ap356589, 21.sp1 ap356704, 21.sp1 ap356787, 21.sp1 ap356803, 21.sp1 ap356817, 21.sp1 ap356847, 21.sp1 ap356899, 21.sp1 ap356978, 21.sp1 ap357047, 21.sp1 ap357049, 21.sp1 ap357083, 21.sp1 ap357188, 21.sp1 ap357377, 21.sp1 ap357395, 21.sp1 ap357499, 21.sp1 ap357574, 21.sp1 ap357607, 21.sp1 ap357653, 21.sp1 ap357670, 21.sp1 ap357718, 21.sp1 ap357768, 21.sp1 ap357769, 21.sp1 ap357775, 21.sp1 ap357800, 21.sp1 ap358034, 21.sp1 ap358101, 21.sp1 ap358131, 21.sp1 ap358234, 21.sp1 ap358345, 21.sp1 ap358364, 21.sp1 ap358399, 21.sp1 ap358411, 21.sp1 ap358469, 21.sp1 ap358508, 21.sp1 ap358563, 21.sp1 ap358578, 21.sp1 ap358582, 21.sp1 ap358726, 21.sp1 ap358730, 21.sp1 ap358731, 21.sp1 ap358885, 21.sp1 ap358887, 21.sp1 ap358889, 21.sp1 ap358893, 21.sp1 ap358907, 21.sp1 ap358942, 21.sp1 ap358971, 21.sp1 ap359023, 21.sp1 ap359030, 21.sp1 ap359076, 21.sp1 ap359085, 21.sp1 ap359112, 21.sp1 ap359145, 21.sp1 ap359172, 21.sp1 ap359227, 21.sp1 ap359305, 21.sp1 ap359423, 21.sp1 ap359465, 21.sp1 ap359470, 21.sp1 ap359536, 21.sp1 ap359589, 21.sp1 ap359644, 21.sp1 ap359685, 21.sp1 ap359729, 21.sp1 ap359752, 21.sp1 ap359753, 21.sp1 ap359764, 21.sp1 ap359808, 21.sp1 ap359829, 21.sp1 ap359911, 21.sp1 ap359956, 21.sp1 ap359974, 21.sp1 ap360209, 21.sp1 ap360211, 21.sp1 ap360259, 21.sp1 ap360265, 21.sp1 ap360295, 21.sp1 ap360306, 21.sp1 ap360325, 21.sp1 ap360373, 21.sp1 ap360459, 21.sp1 ap360586, 21.sp1 ap360600, 21.sp1 ap360771, 21.sp1 ap360893, 21.sp1 ap360907, 21.sp1 ap360912, 21.sp1 ap360931, 21.sp1 ap360966, 21.sp1 ap360993, 21.sp1 ap360997, 21.sp1 ap361055, 21.sp1 ap361122, 21.sp1 ap361153, 21.sp1 ap361338, 21.sp1 ap361412, 21.sp1 ap361420, 21.sp1 ap361520, 21.sp1 ap361533, 21.sp1 ap361559, 21.sp1 ap361560, 21.sp1 ap361579, 21.sp1 ap361641, 21.sp1 ap361820, 21.sp1 ap361821, 21.sp1 ap361830, 21.sp1 ap361854, 21.sp1 ap361883, 21.sp1 ap361945, 21.sp1 ap362163, 21.sp1 ap362298, 21.sp1 ap362317, 21.sp1 ap362379, 21.sp1 ap362532, 21.sp1 ap362553, 21.sp1 ap362593, 21.sp1 ap362637, 21.sp1 ap362825, 21.sp1 ap362827, 21.sp1 ap362848, 21.sp1 ap362961, 21.sp1 ap363001, 21.sp1 ap363128, 21.sp1 ap363146, 21.sp1 ap363191, 21.sp1 ap363218, 21.sp1 ap363228, 21.sp1 ap363265, 21.sp1 ap363363, 21.sp1 ap363560, 21.sp1 ap363584, 21.sp1 ap363639, 21.sp1 ap363695, 21.sp1 ap363705, 21.sp1 ap363729, 21.sp1 ap363846, 21.sp1 ap364003, 21.sp1 ap364004, 21.sp1 ap364062, 21.sp1 ap364118, 21.sp1 ap364239, 21.sp1 ap364243, 21.sp1 ap364256, 21.sp1 ap364304, 21.sp1 ap364358, 21.sp1 ap364369, 21.sp1 ap364384, 21.sp1 ap364471, 21.sp1 ap364473, 21.sp1 ap364559, 21.sp1 ap364568, 21.sp1 ap364670, 21.sp1 ap364772, 21.sp1 ap364879, 21.sp1 ap364898, 21.sp1 ap365167, 21.sp1 ap365170, 21.sp1 ap365354, 21.sp1 ap365379, 21.sp1 ap365390, 21.sp1 ap365449, 21.sp1 ap365556, 21.sp1 ap365572, 21.sp1 ap365584, 21.sp1 ap365597, 21.sp1 ap365632, 21.sp1 ap365633, 21.sp1 ap365662, 21.sp1 ap365730, 21.sp1 ap365798, 21.sp1 ap365889, 21.sp1 ap365970, 21.sp1 ap366118, 21.sp1 ap366211, 21.sp1 ap366268, 21.sp1 ap366290, 21.sp1 ap366295, 21.sp1 ap366348, 21.sp1 ap366373, 21.sp1 ap366692, 21.sp1 ap366744, 21.sp1 ap366747, 21.sp1 ap366803, 21.sp1 ap366960, 21.sp1 ap367322, 21.sp1 ap367340, 21.sp1 ap367461, 21.sp1 ap367524, 21.sp1 ap367782, 21.sp1 ap367794, 21.sp1 ap367998, 21.sp1 ap368001, 21.sp1 ap368399, 21.sp1 ap368497, 21.sp1 ap368604, 21.sp1 ap368903, 21.sp1 ap369132, 21.sp1 ap369173, 21.sp1 ap369190, 21.sp1 ap369206, 21.sp1 ap369261, 21.sp1 ap369434, 21.sp1 ap370388, 21.sp1 ap370620, 21.sp1 ap370654, 21.sp1 ap370801, 21.sp1 ap370888, 21.sp1 ap372022, 21.sp1 ap372043, 21.sp1 ap372106, 21.sp1 ap372229, 21.sp1 ap372337, 21.sp1 ap372351, 21.sp1 ap372457, 21.sp1 ap372582, 21.sp1 ap372842, 21.sp1 ap373015, 21.sp1 ap373187, 21.sp1 ap373276, 21.sp1 ap373349, 21.sp1 ap373554, 21.sp1 ap373777, 21.sp1 ap373813, 21.sp1 ap373814, 21.sp1 ap373899, 21.sp1 ap373914, 21.sp1 ap373950, 21.sp1 ap374144, 21.sp1 ap374145, 21.sp1 ap374265, 21.sp1 ap374353, 21.sp1 ap374366, 21.sp1 ap374557, 21.sp1 ap374576, 21.sp1 ap374787, 21.sp1 ap374822, 21.sp1 ap374830, 21.sp1 ap375026, 21.sp1 ap375036, 21.sp1 ap375053, 21.sp1 ap375061, 21.sp1 ap375355, 21.sp1 ap375418, 21.sp1 ap375517, 21.sp1 ap375674, 21.sp1 ap375931, 21.sp1 ap378258, 21.sp1 ap378328, 21.sp1 ap378970, 21.sp1 ap379387, 21.sp1 ap379440, 21.sp1 ap379473, 21.sp1 ap379847, 21.sp1 ap380248, 21.sp1 ap380473, 21.0 ap354707, 21.0 ap346307, 21.0 ap345633, 21.0 ap354474, 21.0 ap349066, 21.0 ap349056, 21.0 ap355774, 21.0 ap345732, 21.0 ap342324, 21.0 ap355385, 21.0 ap347741, 21.0 ap341471, 21.0 ap343410, 21.0 ap348431, 21.0 ap354793, 21.0 ap339342, 21.0 ap351160, 21.0 ap352972, 21.0 ap359145, 21.0 ap339376, 21.0 ap364358, 21.0 ap356787, 21.0 ap351898, 21.0 ap362637, 21.0 ap350338, 21.0 ap342625, 21.0 ap235252, 21.0 ap354494, 21.0 ap345261, 21.0 ap359536, 21.0 ap346261, 21.0 ap355027, 21.0 ap359465, 21.0 ap363560, 21.0 ap345738, 21.0 ap356458, 21.0 ap364670, 21.0 ap342145, 21.0 ap339200, 21.0 ap357571, 21.0 ap365889, 21.0 ap215990, 21.0 ap339346, 21.0 ap244265, 21.0 ap339781, 21.0 ap364879, 21.0 ap355091, 21.0 ap245148, 21.0 ap339658, 21.0 ap358563, 21.0 ap340054, 21.0 ap341645, 21.0 ap362825, 21.0 ap355894, 21.0 ap352372, 21.0 ap361559, 21.0 ap360306, 21.0 ap362532, 21.0 ap339206, 21.0 ap356164, 21.0 ap366118, 21.0 ap348527, 21.0 ap359470, 21.0 ap352421, 21.0 ap354469, 21.0 ap349206, 21.0 ap344100, 21.0 ap351961, 21.0 ap342461, 21.0 ap346376, 21.0 ap358411, 21.0 ap346577, 21.0 ap346147, 21.0 ap349867, 21.0 ap365170, 21.0 ap345059, 21.0 ap354964, 21.0 ap356271, 21.0 ap363146, 21.0 ap346554, 21.0 ap347246, 21.0 ap342853, 21.0 ap354180, 21.0 ap351988, 21.0 ap356474, 21.0 ap354785, 21.0 ap346253, 21.0 ap354413, 21.0 ap342719, 21.0 ap350465, 21.0 ap343675, 21.0 ap361533, 21.0 ap346900, 21.0 ap339897, 21.0 ap358726, 21.0 ap359433, 21.0 ap351835, 21.0 ap344952, 21.0 ap353843, 21.0 ap356817, 21.0 ap343017, 21.0 ap360586, 21.0 ap346074, 21.0 ap338988, 21.0 ap345069, 21.0 ap355904, 21.0 ap351263, 21.0 ap361590, 21.0 ap346622, 21.0 ap341350, 21.0 ap342975, 21.0 ap344052, 21.0 ap359119, 21.0 ap343351, 21.0 ap350497, 21.0 ap342284, 21.0 ap347603, 21.0 ap340168, 21.0 ap354098, 21.0 ap339395, 21.0 ap349390, 21.0 ap358234, 21.0 ap360912, 21.0 ap345013, 21.0 ap361854, 21.0 ap342669, 21.0 ap343579, 21.0 ap355000, 21.0 ap349210, 21.0 ap361412, 21.0 ap342588, 21.0 ap355107, 21.0 ap348945, 21.0 ap345452, 21.0 ap244609, 21.0 ap346902, 21.0 ap359829, 21.0 ap358469, 21.0 ap357083, 21.0 ap347506, 21.0 ap342696, 21.0 ap345293, 21.0 ap349996, 21.0 ap244020, 21.0 ap348156, 21.0 ap350189, 21.0 ap343495, 21.0 ap367732, 21.0 ap339552, 21.0 ap342175, 21.0 ap359227, 21.0 ap338972, 21.0 ap343352, 21.0 ap352766, 21.0 ap346724, 21.0 ap363228, 21.0 ap344094, 21.0 ap345755, 21.0 ap342483, 21.0 ap346386, 21.0 ap343616, 21.0 ap351478, 21.0 ap343999, 21.0 ap344270, 21.0 ap348472, 21.0 ap358582, 21.0 ap245441, 21.0 ap358893, 21.0 ap354646, 21.0 ap341939, 21.0 ap350308, 21.0 ap357607, 21.0 ap364384, 21.0 ap242300, 21.0 ap349699, 21.0 ap338833, 21.0 ap360600, 21.0 ap342946, 21.0 ap363301, 21.0 ap339477, 21.0 ap235960, 21.0 ap247533, 21.0 ap348473, 21.0 ap339538, 21.0 ap343877, 21.0 ap366373, 21.0 ap364369, 21.0 ap366295, 21.0 ap349617, 21.0 ap339351, 21.0 ap356317, 21.0 ap349850, 21.0 ap347905, 21.0 ap344752, 21.0 ap348143, 21.0 ap365730, 21.0 ap350303, 21.0 ap347158, 21.0 ap351294, 21.0 ap344681, 21.0 ap354069, 21.0 ap347640, 21.0 ap349864, 21.0 ap360459, 21.0 ap361520, 21.0 ap346639, 21.0 ap350110, 21.0 ap350111, 21.0 ap349724, 21.0 ap245468, 21.0 ap344043, 21.0 ap355095, 21.0 ap347016, 21.0 ap350143, 21.0 ap347172, 21.0 ap342836, 21.0 ap352969, 21.0 ap365167, 21.0 ap346379, 21.0 ap364473, 21.0 ap347302, 21.0 ap339209, 21.0 ap348437, 21.0 ap350141, 21.sp1 ap351858, 21.sp1 ap353138, 21.0 ap344548, 21.0 ap345649, 21.0 ap355616, 21.0 ap365632, 21.0 ap357653, 21.0 ap346347, 21.0 ap349872, 21.0 ap354936, 21.0 ap353701, 21.0 ap345627, 21.0 ap345054, 21.0 ap360966, 21.0 ap359752, 21.sp1 ap348437, 21.0 ap348424, 21.sp1 ap351808, 21.0 ap347191, 21.0 ap346183, 21.0 ap351955, 21.0 ap353821, 21.0 ap352109, 21.sp1 ap352924, 21.sp1 ap358426, 21.sp1 ap350575, 21.sp1 ap350949, 21.0 ap345490, 21.0 ap349174, 21.0 ap348753, 21.sp1 ap348315, 21.0 ap346550, 21.0 ap353841, 21.0 ap347884, 21.sp1 ap345524, 21.sp1 ap347555, 21.sp1 ap346485, 21.0 ap346128, 21.0 ap346485, 21.0 ap350204, 21.sp1 ap349174, 21.0 ap349143, 21.sp1 ap352723, 21.sp1 ap347118, 21.sp1 ap343452, 21.0 ap356145, 21.0 ap358889, 21.sp1 ap348101, 21.0 ap343459, 21.0 ap348007, 21.sp1 ap341894, 21.0 ap352978, 21.sp1 ap350539, 21.0 ap348695, 21.sp1 ap352717, 21.sp1 ap350510, 21.sp1 ap346762, 21.sp1 ap340760, 21.sp1 ap343506, 21.sp1 ap358911, 21.sp1 ap343459, 21.0 ap346988, 21.sp1 ap343465, 21.0 ap340760, 21.sp1 ap348424, 21.sp1 ap347191, 21.sp1 ap348695, 21.0 ap359030, 21.0 ap343452, 21.sp1 ap346550, 21.0 ap347930, 21.sp1 ap344856, 21.0 ap347547, 21.0 ap361883, 21.0 ap352515, 21.0 ap352923, 21.0 ap356231, 21.0 ap363584, 21.0 ap348723, 21.sp1 ap339881, 21.sp1 ap352923, 21.0 ap347555, 21.sp1 ap349143, 21.0 ap345378, 21.sp1 ap357909, 21.sp1 ap356495, 21.0 ap346158, 21.sp1 ap343827, 21.sp1 ap348723, 21.0 ap350510, 21.sp1 ap352978, 21.sp1 ap352199, 21.0 ap351216, 21.0 ap345495, 21.sp1 ap351955, 21.0 ap342961, 21.0 ap350022, 21.0 ap356328, 21.0 ap350517, 21.sp1 ap349668, 21.sp1 ap342277, 21.0 ap348093, 21.0 ap341894, 21.0 ap351721, 21.0 ap343827, 21.0 ap344253, 21.0 ap342277, 21.0 ap349916, 21.sp1 ap347884, 21.sp1 ap345864, 21.0 ap345850, 21.0 ap351249, 21.sp1 ap353428, 21.0 ap352723, 21.0 ap351858, 21.sp1 ap354659, 21.0 ap246656, 21.sp1 ap354698, 21.0 ap353428, 21.sp1 ap339553, 21.0 ap341897, 21.0 ap350491, 21.sp1 ap348678, 21.sp1 ap351498, 21.0 ap359589, 21.0 ap352795, 21.0 ap343465, 21.0 ap350591, 21.0 ap248004, 21.0 ap366290, 21.sp1 ap345378, 21.0 ap346076, 21.sp1 ap344548, 21.0 ap348523, 21.0 ap339196, 21.0 ap358345, 21.sp1 ap346158, 21.0 ap348315, 21.0 ap343506, 21.sp1 ap345649, 21.sp1 ap352407, 21.0 ap364471, 21.0 ap339881, 21.0 ap348078, 21.0 ap347118, 21.0 ap346762, 21.sp1 ap343868, 21.0 ap350426, 21.sp1 ap339093, 21.sp1 ap248004, 21.sp1 ap350517, 21.0 ap346562, 21.0 ap354331, 21.sp1 ap350426, 21.sp1 ap343620, 21.sp1 ap350022, 21.0 ap351498, 21.sp1 ap349916, 21.0 ap350474, 21.0 ap339093, 21.sp1 ap351249, 21.0 ap349642, 21.0 ap348100, 21.0 ap346559, 21.0 ap345524, 21.0 ap348694, 21.0 ap352896, 21.0 ap351765, 21.sp1 ap348523, 21.0 ap344020, 21.0 ap342217, 21.0 ap353418, 21.0 ap359729, 21.0 ap343868, 21.0 ap351644, 21.sp1 ap353821, 21.0 ap359076, 21.0 ap349668, 21.sp1 ap343853, 21.sp1 ap347547, 21.sp1 ap351765, 21.0 ap339568, 21.sp1 ap342961, 21.0, 21.0 ap347896, 21.sp1 ap345495, 21.sp1 ap347245, 21.0 ap344856, 21.0 ap343620, 21.0 ap347245, 21.0 ap344945, 21.sp1 ap355708, 21.0 ap351700, 21.0 ap353842, 21.0 ap339553, 21.sp1 ap346988, 21.0 ap350539, 21.sp1 ap348007, 21.sp1 ap348694, 21.0 ap205814, 21.0 ap237573, 21.0 ap240187, 21.0 ap238193, 21.0 ap230925, 21.0 ap239410, 21.0 ap241691, 21.0 ap225333, 21.0 ap229862, 21.0 ap237570, 21.0 ap231358, 21.0 ap241133, 21.0 ap232938, 21.0 ap231084, 21.0 ap241379, 21.0 ap237395, 21.0 ap238089, 21.0 ap237825, 21.0 ap241172, 21.0 ap239722, 21.0 ap221935, 21.0 ap229942, 21.0 ap240784, 21.0 ap242025, 21.0 ap242778, 21.0 ap242972, 21.0 ap242541, 21.0 ap238035, 21.0 ap242597, 21.0 ap241711, 21.0 ap239469, 21.0 ap240661, 21.0 ap242893, 21.0 ap242593, 21.0 ap229160, 21.0 ap243150, 21.0 ap241901, 21.0 ap219733, 21.0 ap242250, 21.0 ap242497, 21.0 ap249383, 21.0 ap248165, 21.0 ap247717, 21.0 ap338839, 21.0 ap338855, 21.0 ap248364, 21.0 ap338830, 21.0 ap247568, 21.0 ap338861, 21.0 ap339077, 21.0 ap339092, 21.0 ap248266, 21.0 ap339156, 21.0 ap338965, 21.0 ap338950, 21.0 ap339244, 21.0 ap338876, 21.0 ap249376, 21.0 ap338964, 21.0 ap338981, 21.0 ap339356, 21.0 ap339041, 21.0 ap338879, 21.0 ap338959, 21.0 ap339169, 21.0 ap339033, 21.0 ap339080, 21.0 ap339108, 21.0 ap339048, 21.0 ap339288, 21.0 ap339179, 21.0 ap339083, 21.0 ap339061, 21.0 ap339109, 21.0 ap339087, 21.0 ap339223, 21.0 ap338946, 21.0 ap338993, 21.0 ap243581, 21.0 ap243935, 21.0 ap245323, 21.0 ap246001, 21.0 ap339573, 21.0 ap246376, 21.0 ap243749, 21.0 ap247424, 21.0 ap339449, 21.0 ap339421, 21.0 ap339387, 21.0 ap245386, 21.0 ap246064, 21.0 ap246387, 21.0 ap339626, 21.0 ap339530, 21.0 ap243808, 21.0 ap247529, 21.0 ap245579, 21.0 ap245245, 21.0 ap247273, 21.0 ap246523, 21.0 ap247426, 21.0 ap246996, 21.0 ap246189, 21.0 ap244712, 21.0 ap339932, 21.0 ap243200, 21.0 ap339645, 21.0 ap339464, 21.0 ap244895, 21.0 ap245755, 21.0 ap245263, 21.0 ap246281, 21.0 ap247376, 21.0 ap339853, 21.0 ap341433, 21.0 ap341382, 21.0 ap339386, 21.0 ap340730, 21.0 ap341393, 21.0 ap341593, 21.0 ap341555, 21.0 ap341655, 21.0 ap340744, 21.0 ap340531, 21.0 ap341846, 21.0 ap341658, 21.0 ap341484, 21.0 ap341945, 21.0 ap341909, 21.0 ap341943, 21.0 ap341942, 21.0 ap342089, 21.0 ap342042, 21.0 ap341969, 21.0 ap341470, 21.0 ap341850, 21.0 ap341595, 21.0 ap341575, 21.0 ap341434, 21.0 ap341683, 21.0 ap341495, 21.0 ap342107, 21.0 ap341944, 21.0 ap342120, 21.0 ap341851, 21.0 ap342038, 21.0 ap340100, 21.0 ap340745, 21.0 ap341585, 21.0 ap341908, 21.0 ap342060, 21.0 ap342081, 21.0 ap342188, 21.0 ap340545, 21.0 ap342168, 21.0 ap341425, 21.0 ap342040, 21.0 ap340749, 21.0 ap342087, 21.0 ap341426, 21.0 ap342132, 21.0 ap341940, 21.0 ap341540, 21.0 ap244183, 21.0 ap244254, 21.0 ap244317, 21.0 ap341586, 21.0 ap341855, 21.0 ap342695, 21.0 ap343319, 21.0 ap342771, 21.0 ap244509, 21.0 ap342792, 21.0 ap343144, 21.0 ap244595, 21.0 ap343488, 21.0 ap343204, 21.0 ap343446, 21.0 ap343504, 21.0 ap244158, 21.0 ap343572, 21.0 ap343398, 21.0 ap342776, 21.0 ap342752, 21.0 ap343537, 21.0 ap342821, 21.0 ap342785, 21.0 ap342960, 21.0 ap343439, 21.0 ap342786, 21.0 ap343243, 21.0 ap343038, 21.0 ap343251, 21.0 ap343457, 21.0 ap343408, 21.0 ap343445, 21.0 ap343541, 21.0 ap342441, 21.0 ap343542, 21.0 ap343503, 21.0 ap342706, 21.0 ap343483, 21.0 ap342606, 21.0 ap342561, 21.0 ap342942, 21.0 ap343790, 21.0 ap342847, 21.0 ap342943, 21.0 ap343647, 21.0 ap343760, 21.0 ap343807, 21.0 ap342868, 21.0 ap343861, 21.0 ap343876, 21.0 ap343772, 21.0 ap343670, 21.0 ap343808, 21.0 ap343864, 21.0 ap342572, 21.0 ap342449, 21.0 ap342325, 21.0 ap343774, 21.0 ap342289, 21.0 ap342523, 21.0 ap342851, 21.0 ap343830, 21.0 ap342899, 21.0 ap342657, 21.0 ap344116, 21.0 ap342336, 21.0 ap342546, 21.0 ap344628, 21.0 ap344700, 21.0 ap344403, 21.0 ap342214, 21.0 ap344464, 21.0 ap344405, 21.0 ap344430, 21.0 ap344754, 21.0 ap344762, 21.0 ap344414, 21.0 ap344150, 21.0 ap344725, 21.0 ap344467, 21.0 ap344272, 21.0 ap344489, 21.0 ap344515, 21.0 ap344763, 21.0 ap344917, 21.0 ap344684, 21.0 ap344755, 21.0 ap344886, 21.0 ap344737, 21.0 ap344659, 21.0 ap344709, 21.0 ap344783, 21.0 ap344114, 21.0 ap344196, 21.0 ap344476, 21.0 ap344301, 21.0 ap344263, 21.0 ap344477, 21.0 ap344452, 21.0 ap344413, 21.0 ap344411, 21.0 ap344431, 21.0 ap344557, 21.0 ap344198, 21.0 ap344570, 21.0 ap344679, 21.0 ap342227, 21.0 ap344757, 21.0 ap344883, 21.0 ap344037, 21.0 ap344663, 21.0 ap344692, 21.0 ap343901, 21.0 ap344698, 21.0 ap343918, 21.0 ap344716, 21.0 ap344083, 21.0 ap343904, 21.0 ap343933, 21.0 ap344068, 21.0 ap343942, 21.0 ap343879, 21.0 ap342220, 21.0 ap343920, 21.0 ap343908, 21.0 ap343959, 21.0 ap343907, 21.0 ap343924, 21.0 ap343981, 21.0 ap343927, 21.0 ap344095, 21.0 ap345451, 21.0 ap345209, 21.0 ap345071, 21.0 ap342226, 21.0 ap345637, 21.0 ap345162, 21.0 ap345705, 21.0 ap345634, 21.0 ap345086, 21.0 ap345245, 21.0 ap345686, 21.0 ap345374, 21.0 ap345720, 21.0 ap345175, 21.0 ap345246, 21.0 ap345196, 21.0 ap345195, 21.0 ap345161, 21.0 ap345263, 21.0 ap345399, 21.0 ap345636, 21.0 ap345695, 21.0 ap345704, 21.0 ap345762, 21.0 ap345745, 21.0 ap346219, 21.0 ap345733, 21.0 ap346127, 21.0 ap346009, 21.0 ap346156, 21.0 ap345769, 21.0 ap346085, 21.0 ap346021, 21.0 ap346141, 21.0 ap346174, 21.0 ap346160, 21.0 ap345872, 21.0 ap346170, 21.0 ap345790, 21.0 ap346135, 21.0 ap345816, 21.0 ap346006, 21.0 ap346171, 21.0 ap346270, 21.0 ap346080, 21.0 ap346079, 21.0 ap346207, 21.0 ap346375, 21.0 ap346500, 21.0 ap346541, 21.0 ap346607, 21.0 ap346570, 21.0 ap346235, 21.0 ap346508, 21.0 ap346361, 21.0 ap346546, 21.0 ap346273, 21.0 ap344969, 21.0 ap346475, 21.0 ap346365, 21.0 ap346512, 21.0 ap346300, 21.0 ap346243, 21.0 ap346380, 21.0 ap346321, 21.0 ap346363, 21.0 ap347131, 21.0 ap346377, 21.0 ap346381, 21.0 ap346552, 21.0 ap346866, 21.0 ap347015, 21.0 ap346578, 21.0 ap346640, 21.0 ap347247, 21.0 ap347263, 21.0 ap346739, 21.0 ap347196, 21.0 ap346527, 21.0 ap346629, 21.0 ap347059, 21.0 ap346706, 21.0 ap347303, 21.0 ap347064, 21.0 ap347256, 21.0 ap347264, 21.0 ap346630, 21.0 ap347218, 21.0 ap347139, 21.0 ap346897, 21.0 ap347330, 21.0 ap347306, 21.0 ap346646, 21.0 ap346989, 21.0 ap346778, 21.0 ap346787, 21.0 ap347065, 21.0 ap347185, 21.0 ap347277, 21.0 ap347313, 21.0 ap347309, 21.0 ap347127, 21.0 ap347189, 21.0 ap345506, 21.0 ap347032, 21.0 ap347008, 21.0 ap345454, 21.0 ap345470, 21.0 ap347297, 21.0 ap345016, 21.0 ap345550, 21.0 ap345492, 21.0 ap345557, 21.0 ap347258, 21.0 ap345526, 21.0 ap346616, 21.0 ap345614, 21.0 ap345528, 21.0 ap345541, 21.0 ap345503, 21.0 ap348880, 21.0 ap345472, 21.0 ap348766, 21.0 ap345046, 21.0 ap348990, 21.0 ap348725, 21.0 ap349228, 21.0 ap348697, 21.0 ap348066, 21.0 ap349198, 21.0 ap349497, 21.0 ap348031, 21.0 ap349044, 21.0 ap348734, 21.0 ap348724, 21.0 ap348768, 21.0 ap348034, 21.0 ap349510, 21.0 ap349201, 21.0 ap349444, 21.0 ap349501, 21.0 ap349612, 21.0 ap349019, 21.0 ap349232, 21.0 ap348728, 21.0 ap349714, 21.0 ap348698, 21.0 ap348777, 21.0 ap349643, 21.0 ap348057, 21.0 ap348913, 21.0 ap349020, 21.0 ap348968, 21.0 ap349517, 21.0 ap348707, 21.0 ap348779, 21.0 ap348942, 21.0 ap348012, 21.0 ap349090, 21.0 ap349487, 21.0 ap348065, 21.0 ap348687, 21.0 ap349664, 21.0 ap349582, 21.0 ap348761, 21.0 ap349974, 21.0 ap349136, 21.0 ap349915, 21.0 ap349219, 21.0 ap349043, 21.0 ap348986, 21.0 ap349496, 21.0 ap349952, 21.0 ap349751, 21.0 ap349583, 21.0 ap349845, 21.0 ap349509, 21.0 ap349745, 21.0 ap349819, 21.0 ap350140, 21.0 ap349900, 21.0 ap349818, 21.0 ap349840, 21.0 ap349907, 21.0 ap350045, 21.0 ap349853, 21.0 ap350175, 21.0 ap349858, 21.0 ap349859, 21.0 ap350070, 21.0 ap349877, 21.0 ap349894, 21.0 ap350032, 21.0 ap350187, 21.0 ap347548, 21.0 ap350122, 21.0 ap347562, 21.0 ap347485, 21.0 ap347981, 21.0 ap347950, 21.0 ap347436, 21.0 ap347677, 21.0 ap348107, 21.0 ap347438, 21.0 ap348361, 21.0 ap347431, 21.0 ap348207, 21.0 ap347895, 21.0 ap347719, 21.0 ap349393, 21.0 ap348503, 21.0 ap348575, 21.0 ap347644, 21.0 ap347597, 21.0 ap349236, 21.0 ap348633, 21.0 ap347682, 21.0 ap347610, 21.0 ap349384, 21.0 ap348514, 21.0 ap348145, 21.0 ap347723, 21.0 ap348334, 21.0 ap347993, 21.0 ap347974, 21.0 ap348362, 21.0 ap348629, 21.0 ap347602, 21.0 ap347444, 21.0 ap347685, 21.0 ap348682, 21.0 ap347726, 21.0 ap347645, 21.0 ap349254, 21.0 ap347766, 21.0 ap348345, 21.0 ap347975, 21.0 ap348367, 21.0 ap348436, 21.0 ap347551, 21.0 ap347476, 21.0 ap349400, 21.0 ap347432, 21.0 ap349262, 21.0 ap348529, 21.0 ap348142, 21.0 ap347536, 21.0 ap347733, 21.0 ap347673, 21.0 ap347697, 21.0 ap348358, 21.0 ap347889, 21.0 ap349235, 21.0 ap348474, 21.0 ap348631, 21.0 ap350478, 21.0 ap348430, 21.0 ap351153, 21.0 ap350864, 21.0 ap350929, 21.0 ap348536, 21.0 ap347898, 21.0 ap351015, 21.0 ap351205, 21.0 ap351942, 21.0 ap349280, 21.0 ap350936, 21.0 ap351179, 21.0 ap349415, 21.0 ap351924, 21.0 ap350884, 21.0 ap351020, 21.0 ap351199, 21.0 ap351213, 21.0 ap351223, 21.0 ap351925, 21.0 ap351868, 21.0 ap351834, 21.0 ap350969, 21.0 ap351960, 21.0 ap351045, 21.0 ap351222, 21.0 ap351936, 21.0 ap353179, 21.0 ap350908, 21.0 ap350990, 21.0 ap351059, 21.0 ap351200, 21.0 ap351214, 21.0 ap353311, 21.0 ap353122, 21.0 ap351165, 21.0 ap352985, 21.0 ap353154, 21.0 ap353499, 21.0 ap353184, 21.0 ap353001, 21.0 ap351243, 21.0 ap351261, 21.0 ap353315, 21.0 ap353419, 21.0 ap353389, 21.0 ap353191, 21.0 ap353025, 21.0 ap351262, 21.0 ap352238, 21.0 ap352182, 21.0 ap352126, 21.0 ap350573, 21.0 ap350538, 21.0 ap352292, 21.0 ap352184, 21.0 ap352192, 21.0 ap350845, 21.0 ap350800, 21.0 ap350740, 21.0 ap351602, 21.0 ap351337, 21.0 ap350593, 21.0 ap352203, 21.0 ap350760, 21.0 ap350604, 21.0 ap351642, 21.0 ap351315, 21.0 ap351345, 21.0 ap351744, 21.0 ap350613, 21.0 ap350772, 21.0 ap351817, 21.0 ap351637, 21.0 ap350564, 21.0 ap350748, 21.0 ap350859, 21.0 ap350566, 21.0 ap350614, 21.0 ap351727, 21.0 ap351803, 21.0 ap351798, 21.0 ap350749, 21.0 ap350827, 21.0 ap350602, 21.0 ap350799, 21.0 ap351639, 21.0 ap351701, 21.0 ap351497, 21.0 ap350489, 21.0 ap350835, 21.0 ap351363, 21.0 ap350603, 21.0 ap351335, 21.0 ap350330, 21.0 ap351682, 21.0 ap351641, 21.0 ap351401, 21.0 ap352340, 21.0 ap352337, 21.0 ap350406, 21.0 ap350315, 21.0 ap351527, 21.0 ap352804, 21.0 ap351733, 21.0 ap352707, 21.0 ap350429, 21.0 ap352511, 21.0 ap352293, 21.0 ap352915, 21.0 ap352805, 21.0 ap350318, 21.0 ap352345, 21.0 ap350337, 21.0 ap352926, 21.0 ap352423, 21.0 ap352386, 21.0 ap352887, 21.0 ap350321, 21.0 ap350211, 21.0 ap350469, 21.0 ap352390, 21.0 ap352304, 21.0 ap350434, 21.0 ap352357, 21.0 ap352927, 21.0 ap350471, 21.0 ap352320, 21.0 ap352801, 21.0 ap350322, 21.0 ap350218, 21.0 ap352711, 21.0 ap352498, 21.0 ap353549, 21.0 ap352508, 21.0 ap353649, 21.0 ap350436, 21.0 ap352728, 21.0 ap352646, 21.0 ap353839, 21.0 ap353856, 21.0 ap353879, 21.0 ap353558, 21.0 ap353623, 21.0 ap353844, 21.0 ap353594, 21.0 ap353865, 21.0 ap353852, 21.0 ap353845, 21.0 ap353836, 21.0 ap353870, 21.0 ap355647, 21.0 ap357040, 21.0 ap355753, 21.0 ap355673, 21.0 ap356935, 21.0 ap357019, 21.0 ap355699, 21.0 ap355825, 21.0 ap356978, 21.0 ap355670, 21.0 ap356842, 21.0 ap356969, 21.0 ap357161, 21.0 ap357105, 21.0 ap357366, 21.0 ap357347, 21.0 ap357430, 21.0 ap357172, 21.0 ap357560, 21.0 ap357181, 21.0 ap357508, 21.0 ap357187, 21.0 ap357039, 21.0 ap357087, 21.0 ap357162, 21.0 ap357454, 21.0 ap357185, 21.0 ap357452, 21.0 ap354909, 21.0 ap357357, 21.0 ap357330, 21.0 ap357562, 21.0 ap356301, 21.0 ap357507, 21.0 ap357146, 21.0 ap357176, 21.0 ap357525, 21.0 ap357417, 21.0 ap357081, 21.0 ap355002, 21.0 ap356350, 21.0 ap355003, 21.0 ap355105, 21.0 ap355069, 21.0 ap356345, 21.0 ap356392, 21.0 ap356353, 21.0 ap355102, 21.0 ap356289, 21.0 ap356412, 21.0 ap356320, 21.0 ap355020, 21.0 ap354564, 21.0 ap357621, 21.0 ap357610, 21.0 ap354616, 21.0 ap354528, 21.0 ap357595, 21.0 ap357675, 21.0 ap357623, 21.0 ap357690, 21.0 ap356584, 21.0 ap356497, 21.0 ap354726, 21.0 ap354673, 21.0 ap356503, 21.0 ap356707, 21.0 ap354681, 21.0 ap354580, 21.0 ap354595, 21.0 ap354527, 21.0 ap354636, 21.0 ap354779, 21.0 ap354690, 21.0 ap354556, 21.0 ap356717, 21.0 ap354557, 21.0 ap354615, 21.0 ap354129, 21.0 ap356803, 21.0 ap356572, 21.0 ap354784, 21.0 ap354194, 21.0 ap357737, 21.0 ap357761, 21.0 ap357802, 21.0 ap356575, 21.0 ap356749, 21.0 ap354447, 21.0 ap355353, 21.0 ap355283, 21.0 ap354052, 21.0 ap356029, 21.0 ap356152, 21.0 ap355125, 21.0 ap355639, 21.0 ap356254, 21.0 ap354077, 21.0 ap355201, 21.0 ap355300, 21.0 ap354465, 21.0 ap354170, 21.0 ap353954, 21.0 ap356142, 21.0 ap355952, 21.0 ap355896, 21.0 ap355568, 21.0 ap354415, 21.0 ap355356, 21.0 ap355628, 21.0 ap355836, 21.0 ap356253, 21.0 ap354380, 21.0 ap355112, 21.0 ap354200, 21.0 ap355360, 21.0 ap353985, 21.0 ap355599, 21.0 ap355236, 21.0 ap355897, 21.0 ap354439, 21.0 ap355838, 21.0 ap355121, 21.0 ap355637, 21.0 ap354005, 21.0 ap355265, 21.0 ap354412, 21.0 ap355638, 21.0 ap354314, 21.0 ap363297, 21.0 ap363415, 21.0 ap363330, 21.0 ap363233, 21.0 ap356007, 21.0 ap363408, 21.0 ap363577, 21.0 ap362707, 21.0 ap362798, 21.0 ap362708, 21.0 ap363305, 21.0 ap363023, 21.0 ap363247, 21.0 ap362963, 21.0 ap362741, 21.0 ap360531, 21.0 ap362964, 21.0 ap363049, 21.0 ap360198, 21.0 ap359767, 21.0 ap359925, 21.0 ap362680, 21.0 ap360412, 21.0 ap362960, 21.0 ap359927, 21.0 ap360231, 21.0 ap362683, 21.0 ap359892, 21.0 ap359926, 21.0 ap359772, 21.0 ap360245, 21.0 ap360319, 21.0 ap359908, 21.0 ap359973, 21.0 ap359791, 21.0 ap360250, 21.0 ap363208, 21.0 ap363221, 21.0 ap363197, 21.0 ap363189, 21.0 ap360362, 21.0 ap358099, 21.0 ap359556, 21.0 ap359657, 21.0 ap361534, 21.0 ap358241, 21.0 ap358019, 21.0 ap358133, 21.0 ap358328, 21.0 ap362263, 21.0 ap358920, 21.0 ap359191, 21.0 ap361936, 21.0 ap361831, 21.0 ap362122, 21.0 ap359298, 21.0 ap361637, 21.0 ap361876, 21.0 ap362364, 21.0 ap359464, 21.0 ap358046, 21.0 ap358271, 21.0 ap361537, 21.0 ap358338, 21.0 ap358145, 21.0 ap358942, 21.0 ap358101, 21.0 ap362141, 21.0 ap357856, 21.0 ap361643, 21.0 ap362365, 21.0 ap358289, 21.0 ap362019, 21.0 ap358089, 21.0 ap362269, 21.0 ap359218, 21.0 ap361847, 21.0 ap361691, 21.0 ap358096, 21.0 ap361551, 21.0 ap359421, 21.0 ap362120, 21.0 ap362149, 21.0 ap358314, 21.0 ap362289, 21.0 ap358013, 21.0 ap361930, 21.0 ap358944, 21.0 ap358894, 21.0 ap359646, 21.0 ap362193, 21.0 ap358845, 21.0 ap360790, 21.0 ap358604, 21.0 ap360943, 21.0 ap361353, 21.0 ap362316, 21.0 ap361823, 21.0 ap361620, 21.0 ap358658, 21.0 ap361154, 21.0 ap359085, 21.0 ap359130, 21.0 ap358365, 21.0 ap359029, 21.0 ap358568, 21.0 ap358640, 21.0 ap359164, 21.0 ap358681, 21.0 ap360615, 21.0 ap359186, 21.0 ap361305, 21.0 ap359113, 21.0 ap358643, 21.0 ap360906, 21.0 ap358521, 21.0 ap359044, 21.0 ap360627, 21.0 ap359118, 21.0 ap359121, 21.0 ap360594, 21.0 ap358647, 21.0 ap360737, 21.0 ap359153, 21.0 ap361016, 21.0 ap358891, 21.sp1 ap237825, 21.0 ap361459, 21.0 ap363824, 21.sp1 ap241691, 21.0 ap363705, 21.0 ap364075, 21.0 ap363976, 21.0 ap363671, 21.sp1 ap242025, 21.sp1 ap239410, 21.sp1 ap241133, 21.0 ap364248, 21.sp1 ap240187, 21.sp1 ap244317, 21.sp1 ap237570, 21.0 ap363693, 21.sp1 ap238035, 21.sp1 ap240661, 21.0 ap363753, 21.0 ap363845, 21.0 ap364381, 21.0 ap364148, 21.sp1 ap239469, 21.sp1 ap244509, 21.0 ap363694, 21.sp1 ap241172, 21.0 ap364210, 21.0 ap363984, 21.sp1 ap241711, 21.sp1 ap240784, 21.sp1 ap242250, 21.sp1 ap239722, 21.sp1 ap241901, 21.sp1 ap237573, 21.sp1 ap238089, 21.sp1 ap244595, 21.0 ap364067, 21.sp1 ap237395, 21.0 ap363884, 21.sp1 ap238193, 21.0 ap363638, 21.0 ap364241, 21.0 ap365900, 21.0 ap364562, 21.sp1 ap205814, 21.0 ap364755, 21.sp1 ap241379, 21.0 ap364863, 21.sp1 ap229862, 21.sp1 ap221935, 21.sp1 ap231084, 21.0 ap364611, 21.sp1 ap232938, 21.sp1 ap245197, 21.0 ap364770, 21.sp1 ap245323, 21.sp1 ap225333, 21.sp1 ap245386, 21.0 ap364635, 21.0 ap365979, 21.sp1 ap229942, 21.sp1 ap244712, 21.0 ap364711, 21.0 ap364795, 21.sp1 ap229160, 21.sp1 ap219733, 21.0 ap365984, 21.0 ap364510, 21.0 ap364754, 21.sp1 ap230925, 21.sp1 ap231358, 21.0 ap364843, 21.sp1 ap244895, 21.sp1 ap245245, 21.sp1 ap245579, 21.sp1 ap245755, 21.sp1 ap246281, 21.sp1 ap246189, 21.sp1 ap246001, 21.sp1 ap246376, 21.sp1 ap245263, 21.0 ap366320, 21.0 ap366383, 21.0 ap367307, 21.sp1 ap246387, 21.0 ap366661, 21.sp1 ap246064, 21.0 ap366395, 21.0 ap366411, 21.0 ap366807, 21.0 ap366836, 21.0 ap364956, 21.0 ap366398, 21.0 ap378144, 21.0 ap365131, 21.0 ap368682, 21.sp1 ap242593, 21.sp1 ap244183, 21.sp1 ap242893, 21.sp1 ap243897, 21.0 ap365040, 21.0 ap365858, 21.sp1 ap243581, 21.0 ap365155, 21.0 ap364904, 21.0 ap365886, 21.0 ap365530, 21.0 ap365060, 21.0 ap365640, 21.0 ap365682, 21.sp1 ap243150, 21.0 ap365689, 21.0 ap365773, 21.sp1 ap242497, 21.sp1 ap242972, 21.sp1 ap244254, 21.sp1 ap242597, 21.sp1 ap242778, 21.sp1 ap243749, 21.sp1 ap243935, 21.sp1 ap243200, 21.sp1 ap244158, 21.0 ap365124, 21.0 ap364906, 21.sp1 ap242541, 21.sp1 ap247424, 21.sp1 ap246996, 21.sp1 ap247529, 21.sp1 ap247376, 21.sp1 ap247426, 21.sp1 ap247568, 21.sp1 ap246523, 21.sp1 ap249376, 21.sp1 ap247273, 21.sp1 ap338959, 21.sp1 ap338876, 21.sp1 ap339033, 21.sp1 ap339077, 21.sp1 ap339092, 21.sp1 ap341484, 21.sp1 ap338839, 21.sp1 ap338981, 21.sp1 ap341555, 21.sp1 ap340730, 21.sp1 ap338855, 21.sp1 ap249383, 21.sp1 ap338879, 21.sp1 ap339156, 21.sp1 ap341426, 21.sp1 ap341452, 21.sp1 ap339041, 21.sp1 ap341586, 21.sp1 ap338861, 21.sp1 ap338830, 21.sp1 ap341382, 21.sp1 ap341593, 21.sp1 ap339080, 21.sp1 ap339108, 21.sp1 ap341495, 21.sp1 ap340531, 21.sp1 ap340744, 21.sp1 ap339169, 21.sp1 ap341470, 21.sp1 ap341433, 21.sp1 ap338946, 21.sp1 ap341575, 21.sp1 ap339048, 21.sp1 ap338993, 21.sp1 ap339083, 21.sp1 ap340545, 21.sp1 ap249331, 21.sp1 ap340745, 21.sp1 ap341434, 21.sp1 ap341393, 21.sp1 ap338950, 21.sp1 ap341595, 21.sp1 ap339061, 21.sp1 ap339109, 21.sp1 ap340749, 21.sp1 ap339087, 21.sp1 ap341425, 21.sp1 ap339021, 21.sp1 ap339179, 21.sp1 ap341585, 21.sp1 ap341658, 21.sp1 ap341540, 21.sp1 ap339244, 21.sp1 ap339288, 21.sp1 ap339223, 21.sp1 ap339301, 21.sp1 ap341655, 21.sp1 ap339421, 21.sp1 ap339464, 21.sp1 ap339573, 21.sp1 ap248266, 21.sp1 ap339530, 21.sp1 ap341683, 21.sp1 ap339386, 21.sp1 ap339932, 21.sp1 ap247717, 21.sp1 ap248364, 21.sp1 ap339449, 21.sp1 ap339853, 21.sp1 ap339626, 21.sp1 ap339387, 21.sp1 ap248165, 21.sp1 ap339356, 21.sp1 ap340100, 21.sp1 ap341908, 21.sp1 ap341846, 21.sp1 ap341855, 21.sp1 ap339645, 21.sp1 ap341850, 21.sp1 ap341909, 21.sp1 ap343144, 21.sp1 ap342868, 21.sp1 ap341851, 21.sp1 ap342960, 21.sp1 ap343542, 21.sp1 ap342942, 21.sp1 ap343238, 21.sp1 ap343038, 21.sp1 ap343145, 21.sp1 ap342899, 21.sp1 ap343243, 21.sp1 ap343572, 21.sp1 ap342943, 21.sp1 ap343537, 21.sp1 ap343251, 21.sp1 ap343541, 21.sp1 ap343760, 21.sp1 ap343647, 21.sp1 ap343204, 21.sp1 ap343604, 21.sp1 ap343772, 21.sp1 ap342087, 21.sp1 ap343670, 21.sp1 ap341943, 21.sp1 ap342132, 21.sp1 ap342042, 21.sp1 ap341944, 21.sp1 ap342089, 21.sp1 ap343774, 21.sp1 ap342107, 21.sp1 ap341969, 21.sp1 ap342060, 21.sp1 ap342120, 21.sp1 ap341945, 21.sp1 ap342040, 21.sp1 ap342199, 21.sp1 ap342038, 21.sp1 ap342081, 21.sp1 ap342079, 21.sp1 ap342168, 21.sp1 ap342785, 21.sp1 ap342214, 21.sp1 ap342178, 21.sp1 ap342523, 21.sp1 ap342786, 21.sp1 ap342473, 21.sp1 ap342776, 21.sp1 ap342546, 21.sp1 ap342606, 21.sp1 ap342188, 21.sp1 ap342220, 21.sp1 ap343319, 21.sp1 ap342695, 21.sp1 ap342325, 21.sp1 ap342234, 21.sp1 ap342752, 21.sp1 ap342832, 21.sp1 ap342336, 21.sp1 ap343446, 21.sp1 ap342561, 21.sp1 ap342226, 21.sp1 ap343483, 21.sp1 ap342227, 21.sp1 ap342289, 21.sp1 ap342572, 21.sp1 ap341940, 21.sp1 ap342657, 21.sp1 ap342441, 21.sp1 ap343439, 21.sp1 ap343488, 21.sp1 ap343457, 21.sp1 ap343398, 21.sp1 ap341942, 21.sp1 ap342706, 21.sp1 ap342847, 21.sp1 ap342449, 21.sp1 ap342821, 21.sp1 ap343408, 21.sp1 ap343503, 21.sp1 ap345071, 21.sp1 ap345209, 21.sp1 ap343807, 21.sp1 ap344464, 21.sp1 ap345161, 21.sp1 ap345240, 21.sp1 ap344467, 21.sp1 ap343790, 21.sp1 ap345016, 21.sp1 ap345231, 21.sp1 ap345086, 21.sp1 ap345245, 21.sp1 ap345056, 21.sp1 ap345162, 21.sp1 ap343808, 21.sp1 ap345106, 21.sp1 ap344457, 21.sp1 ap344476, 21.sp1 ap345046, 21.sp1 ap345195, 21.sp1 ap344969, 21.sp1 ap345049, 21.sp1 ap345263, 21.sp1 ap344477, 21.sp1 ap344458, 21.sp1 ap345399, 21.sp1 ap345394, 21.sp1 ap345196, 21.sp1 ap345374, 21.sp1 ap343864, 21.sp1 ap343861, 21.sp1 ap344603, 21.sp1 ap344515, 21.sp1 ap345451, 21.sp1 ap344679, 21.sp1 ap344557, 21.sp1 ap343876, 21.sp1 ap344486, 21.sp1 ap344628, 21.sp1 ap343830, 21.sp1 ap344570, 21.sp1 ap344042, 21.sp1 ap344663, 21.sp1 ap344068, 21.sp1 ap344659, 21.sp1 ap343904, 21.sp1 ap343920, 21.sp1 ap343942, 21.sp1 ap344196, 21.sp1 ap344862, 21.sp1 ap344692, 21.sp1 ap344757, 21.sp1 ap344716, 21.sp1 ap344917, 21.sp1 ap344489, 21.sp1 ap344113, 21.sp1 ap343924, 21.sp1 ap343879, 21.sp1 ap343907, 21.sp1 ap344698, 21.sp1 ap344114, 21.sp1 ap344754, 21.sp1 ap344762, 21.sp1 ap344095, 21.sp1 ap344116, 21.sp1 ap344725, 21.sp1 ap344700, 21.sp1 ap344037, 21.sp1 ap343959, 21.sp1 ap343981, 21.sp1 ap343927, 21.sp1 ap343908, 21.sp1 ap344883, 21.sp1 ap343901, 21.sp1 ap343918, 21.sp1 ap344763, 21.sp1 ap344150, 21.sp1 ap343933, 21.sp1 ap344263, 21.sp1 ap344709, 21.sp1 ap344755, 21.sp1 ap344737, 21.sp1 ap344684, 21.sp1 ap344301, 21.sp1 ap344411, 21.sp1 ap344886, 21.sp1 ap344783, 21.sp1 ap344430, 21.sp1 ap344413, 21.sp1 ap344403, 21.sp1 ap344198, 21.sp1 ap344431, 21.sp1 ap344272, 21.sp1 ap344405, 21.sp1 ap344414, 21.sp1 ap344452, 21.sp1 ap345704, 21.sp1 ap345705, 21.sp1 ap346270, 21.sp1 ap346080, 21.sp1 ap346156, 21.sp1 ap346135, 21.sp1 ap346085, 21.sp1 ap345733, 21.sp1 ap345720, 21.sp1 ap345695, 21.sp1 ap346127, 21.sp1 ap346273, 21.sp1 ap346160, 21.sp1 ap346141, 21.sp1 ap345686, 21.sp1 ap345477, 21.sp1 ap346079, 21.sp1 ap345503, 21.sp1 ap345506, 21.sp1 ap345541, 21.sp1 ap345526, 21.sp1 ap345557, 21.sp1 ap345614, 21.sp1 ap345528, 21.sp1 ap345550, 21.sp1 ap345525, 21.sp1 ap345454, 21.sp1 ap345492, 21.sp1 ap346361, 21.sp1 ap345472, 21.sp1 ap346475, 21.sp1 ap345548, 21.sp1 ap346617, 21.sp1 ap346578, 21.sp1 ap346630, 21.sp1 ap346380, 21.sp1 ap346527, 21.sp1 ap346300, 21.sp1 ap346381, 21.sp1 ap346363, 21.sp1 ap346377, 21.sp1 ap346541, 21.sp1 ap346500, 21.sp1 ap346351, 21.sp1 ap346365, 21.sp1 ap346321, 21.sp1 ap346546, 21.sp1 ap346570, 21.sp1 ap346508, 21.sp1 ap346629, 21.sp1 ap346375, 21.sp1 ap346616, 21.sp1 ap345637, 21.sp1 ap346512, 21.sp1 ap346021, 21.sp1 ap345744, 21.sp1 ap345826, 21.sp1 ap345762, 21.sp1 ap346207, 21.sp1 ap346235, 21.sp1 ap346171, 21.sp1 ap346552, 21.sp1 ap345745, 21.sp1 ap345634, 21.sp1 ap345769, 21.sp1 ap345887, 21.sp1 ap346219, 21.sp1 ap346031, 21.sp1 ap345790, 21.sp1 ap345636, 21.sp1 ap346046, 21.sp1 ap346174, 21.sp1 ap346006, 21.sp1 ap346243, 21.sp1 ap346230, 21.sp1 ap345816, 21.sp1 ap346009, 21.sp1 ap346170, 21.sp1 ap345872, 21.sp1 ap346246, 21.sp1 ap346706, 21.sp1 ap347974, 21.sp1 ap347983, 21.sp1 ap347196, 21.sp1 ap346715, 21.sp1 ap348019, 21.sp1 ap347032, 21.sp1 ap347127, 21.sp1 ap348057, 21.sp1 ap347065, 21.sp1 ap348065, 21.sp1 ap346687, 21.sp1 ap347059, 21.sp1 ap347131, 21.sp1 ap347218, 21.sp1 ap347185, 21.sp1 ap347928, 21.sp1 ap347898, 21.sp1 ap346690, 21.sp1 ap347950, 21.sp1 ap348004, 21.sp1 ap348066, 21.sp1 ap347993, 21.sp1 ap348034, 21.sp1 ap348031, 21.sp1 ap347139, 21.sp1 ap347064, 21.sp1 ap346866, 21.sp1 ap347189, 21.sp1 ap348012, 21.sp1 ap347981, 21.sp1 ap346778, 21.sp1 ap348184, 21.sp1 ap346989, 21.sp1 ap348430, 21.sp1 ap348474, 21.sp1 ap347250, 21.sp1 ap347263, 21.sp1 ap348358, 21.sp1 ap347297, 21.sp1 ap348514, 21.sp1 ap346897, 21.sp1 ap348207, 21.sp1 ap348361, 21.sp1 ap347644, 21.sp1 ap346787, 21.sp1 ap347015, 21.sp1 ap347610, 21.sp1 ap348486, 21.sp1 ap348145, 21.sp1 ap347256, 21.sp1 ap346837, 21.sp1 ap348536, 21.sp1 ap347264, 21.sp1 ap347645, 21.sp1 ap348433, 21.sp1 ap347277, 21.sp1 ap348503, 21.sp1 ap348334, 21.sp1 ap347673, 21.sp1 ap348362, 21.sp1 ap346739, 21.sp1 ap346862, 21.sp1 ap347258, 21.sp1 ap347247, 21.sp1 ap348161, 21.sp1 ap348345, 21.sp1 ap348367, 21.sp1 ap347895, 21.sp1 ap348436, 21.sp1 ap348529, 21.sp1 ap347280, 21.sp1 ap347682, 21.sp1 ap347685, 21.sp1 ap347723, 21.sp1 ap347719, 21.sp1 ap347766, 21.sp1 ap347733, 21.sp1 ap347677, 21.sp1 ap347889, 21.sp1 ap347697, 21.sp1 ap347432, 21.sp1 ap347726, 21.sp1 ap347476, 21.sp1 ap347879, 21.sp1 ap346640, 21.sp1 ap348086, 21.sp1 ap347313, 21.sp1 ap347536, 21.sp1 ap347330, 21.sp1 ap347303, 21.sp1 ap348121, 21.sp1 ap348139, 21.sp1 ap347436, 21.sp1 ap347485, 21.sp1 ap347597, 21.sp1 ap347444, 21.sp1 ap347431, 21.sp1 ap347309, 21.sp1 ap347438, 21.sp1 ap347306, 21.sp1 ap347551, 21.sp1 ap348079, 21.sp1 ap348142, 21.sp1 ap347602, 21.sp1 ap349280, 21.sp1 ap348879, 21.sp1 ap348768, 21.sp1 ap349877, 21.sp1 ap349444, 21.sp1 ap349228, 21.sp1 ap349235, 21.sp1 ap349400, 21.sp1 ap349907, 21.sp1 ap348777, 21.sp1 ap348880, 21.sp1 ap350045, 21.sp1 ap349236, 21.sp1 ap348741, 21.sp1 ap349900, 21.sp1 ap349952, 21.sp1 ap349901, 21.sp1 ap349393, 21.sp1 ap349894, 21.sp1 ap349476, 21.sp1 ap349375, 21.sp1 ap349974, 21.sp1 ap349415, 21.sp1 ap348779, 21.sp1 ap349479, 21.sp1 ap349230, 21.sp1 ap349254, 21.sp1 ap349915, 21.sp1 ap349383, 21.sp1 ap349441, 21.sp1 ap348766, 21.sp1 ap349262, 21.sp1 ap349232, 21.sp1 ap349384, 21.sp1 ap349923, 21.sp1 ap348682, 21.sp1 ap350032, 21.sp1 ap348629, 21.sp1 ap348574, 21.sp1 ap348986, 21.sp1 ap349583, 21.sp1 ap349043, 21.sp1 ap349009, 21.sp1 ap348631, 21.sp1 ap348687, 21.sp1 ap349496, 21.sp1 ap349509, 21.sp1 ap348575, 21.sp1 ap348913, 21.sp1 ap348608, 21.sp1 ap348964, 21.sp1 ap349497, 21.sp1 ap348633, 21.sp1 ap348697, 21.sp1 ap348987, 21.sp1 ap348942, 21.sp1 ap349044, 21.sp1 ap349510, 21.sp1 ap348968, 21.sp1 ap349501, 21.sp1 ap350070, 21.sp1 ap349517, 21.sp1 ap349019, 21.sp1 ap348990, 21.sp1 ap349582, 21.sp1 ap348565, 21.sp1 ap349487, 21.sp1 ap349020, 21.sp1 ap348980, 21.sp1 ap349745, 21.sp1 ap349136, 21.sp1 ap349219, 21.sp1 ap349714, 21.sp1 ap349751, 21.sp1 ap349086, 21.sp1 ap349198, 21.sp1 ap349090, 21.sp1 ap349744, 21.sp1 ap348728, 21.sp1 ap349221, 21.sp1 ap348707, 21.sp1 ap349201, 21.sp1 ap349107, 21.sp1 ap349858, 21.sp1 ap349684, 21.sp1 ap349845, 21.sp1 ap349818, 21.sp1 ap349612, 21.sp1 ap348734, 21.sp1 ap348724, 21.sp1 ap349859, 21.sp1 ap348725, 21.sp1 ap349643, 21.sp1 ap349819, 21.sp1 ap349840, 21.sp1 ap349853, 21.sp1 ap349836, 21.sp1 ap350429, 21.sp1 ap348698, 21.sp1 ap349623, 21.sp1 ap350180, 21.sp1 ap351261, 21.sp1 ap349664, 21.sp1 ap350399, 21.sp1 ap350315, 21.sp1 ap350330, 21.sp1 ap350404, 21.sp1 ap350431, 21.sp1 ap350164, 21.sp1 ap350370, 21.sp1 ap350318, 21.sp1 ap351262, 21.sp1 ap350337, 21.sp1 ap350211, 21.sp1 ap350175, 21.sp1 ap350391, 21.sp1 ap350321, 21.sp1 ap350187, 21.sp1 ap351259, 21.sp1 ap350322, 21.sp1 ap350218, 21.sp1 ap350406, 21.sp1 ap350353, 21.sp1 ap350122, 21.sp1 ap350396, 21.sp1 ap350140, 21.sp1 ap350748, 21.sp1 ap350705, 21.sp1 ap350527, 21.sp1 ap350603, 21.sp1 ap351335, 21.sp1 ap350584, 21.sp1 ap350799, 21.sp1 ap350434, 21.sp1 ap351365, 21.sp1 ap350740, 21.sp1 ap350749, 21.sp1 ap350800, 21.sp1 ap350604, 21.sp1 ap350772, 21.sp1 ap350538, 21.sp1 ap351337, 21.sp1 ap351367, 21.sp1 ap350760, 21.sp1 ap350436, 21.sp1 ap350593, 21.sp1 ap350469, 21.sp1 ap350613, 21.sp1 ap350788, 21.sp1 ap350564, 21.sp1 ap350566, 21.sp1 ap351315, 21.sp1 ap350524, 21.sp1 ap350471, 21.sp1 ap351363, 21.sp1 ap351497, 21.sp1 ap351401, 21.sp1 ap350602, 21.sp1 ap351345, 21.sp1 ap350614, 21.sp1 ap351425, 21.sp1 ap351293, 21.sp1 ap350835, 21.sp1 ap351527, 21.sp1 ap351223, 21.sp1 ap350864, 21.sp1 ap350990, 21.sp1 ap350929, 21.sp1 ap351045, 21.sp1 ap350486, 21.sp1 ap351020, 21.sp1 ap351199, 21.sp1 ap350843, 21.sp1 ap351213, 21.sp1 ap351052, 21.sp1 ap351023, 21.sp1 ap350936, 21.sp1 ap350489, 21.sp1 ap351214, 21.sp1 ap351232, 21.sp1 ap351200, 21.sp1 ap350845, 21.sp1 ap351165, 21.sp1 ap351179, 21.sp1 ap351059, 21.sp1 ap350908, 21.sp1 ap351015, 21.sp1 ap351239, 21.sp1 ap350969, 21.sp1 ap351153, 21.sp1 ap351040, 21.sp1 ap351019, 21.sp1 ap352390, 21.sp1 ap351205, 21.sp1 ap352411, 21.sp1 ap351189, 21.sp1 ap351222, 21.sp1 ap351243, 21.sp1 ap352762, 21.sp1 ap352320, 21.sp1 ap352508, 21.sp1 ap352707, 21.sp1 ap352345, 21.sp1 ap353179, 21.sp1 ap352511, 21.sp1 ap353191, 21.sp1 ap353025, 21.sp1 ap352711, 21.sp1 ap352323, 21.sp1 ap352915, 21.sp1 ap352357, 21.sp1 ap352423, 21.sp1 ap353122, 21.sp1 ap353311, 21.sp1 ap352985, 21.sp1 ap353389, 21.sp1 ap352337, 21.sp1 ap352646, 21.sp1 ap352293, 21.sp1 ap352926, 21.sp1 ap353184, 21.sp1 ap352997, 21.sp1 ap353154, 21.sp1 ap352728, 21.sp1 ap353001, 21.sp1 ap352498, 21.sp1 ap352304, 21.sp1 ap352927, 21.sp1 ap352409, 21.sp1 ap352386, 21.sp1 ap352801, 21.sp1 ap353315, 21.sp1 ap352804, 21.sp1 ap352880, 21.sp1 ap352887, 21.sp1 ap351868, 21.sp1 ap351960, 21.sp1 ap352806, 21.sp1 ap352805, 21.sp1 ap351924, 21.sp1 ap353658, 21.sp1 ap351936, 21.sp1 ap351925, 21.sp1 ap352182, 21.sp1 ap353623, 21.sp1 ap352126, 21.sp1 ap351942, 21.sp1 ap352184, 21.sp1 ap353632, 21.sp1 ap352129, 21.sp1 ap352192, 21.sp1 ap352143, 21.sp1 ap353558, 21.sp1 ap352113, 21.sp1 ap353649, 21.sp1 ap352203, 21.sp1 ap353594, 21.sp1 ap351637, 21.sp1 ap351603, 21.sp1 ap351639, 21.sp1 ap351642, 21.sp1 ap351540, 21.sp1 ap351602, 21.sp1 ap351641, 21.sp1 ap351817, 21.sp1 ap351733, 21.sp1 ap353419, 21.sp1 ap353515, 21.sp1 ap353444, 21.sp1 ap351682, 21.sp1 ap351738, 21.sp1 ap352238, 21.sp1 ap353539, 21.sp1 ap352264, 21.sp1 ap351798, 21.sp1 ap351723, 21.sp1 ap351744, 21.sp1 ap352292, 21.sp1 ap351803, 21.sp1 ap351834, 21.sp1 ap353499, 21.sp1 ap355353, 21.sp1 ap355300, 21.sp1 ap351727, 21.sp1 ap354012, 21.sp1 ap354556, 21.sp1 ap353865, 21.sp1 ap355356, 21.sp1 ap353954, 21.sp1 ap353845, 21.sp1 ap354445, 21.sp1 ap355069, 21.sp1 ap354527, 21.sp1 ap354528, 21.sp1 ap354077, 21.sp1 ap354557, 21.sp1 ap353852, 21.sp1 ap353985, 21.sp1 ap354447, 21.sp1 ap353986, 21.sp1 ap353870, 21.sp1 ap353856, 21.sp1 ap355020, 21.sp1 ap354415, 21.sp1 ap353879, 21.sp1 ap354005, 21.sp1 ap354465, 21.sp1 ap354439, 21.sp1 ap354094, 21.sp1 ap353812, 21.sp1 ap354535, 21.sp1 ap355002, 21.sp1 ap353836, 21.sp1 ap353794, 21.sp1 ap353708, 21.sp1 ap354194, 21.sp1 ap354164, 21.sp1 ap354719, 21.sp1 ap354316, 21.sp1 ap354636, 21.sp1 ap354784, 21.sp1 ap354580, 21.sp1 ap354909, 21.sp1 ap354595, 21.sp1 ap354170, 21.sp1 ap354681, 21.sp1 ap354685, 21.sp1 ap354200, 21.sp1 ap354129, 21.sp1 ap354314, 21.sp1 ap354726, 21.sp1 ap354755, 21.sp1 ap354615, 21.sp1 ap354690, 21.sp1 ap354154, 21.sp1 ap354649, 21.sp1 ap354564, 21.sp1 ap354779, 21.sp1 ap354673, 21.sp1 ap354616, 21.sp1 ap355125, 21.sp1 ap355265, 21.sp1 ap354412, 21.sp1 ap355112, 21.sp1 ap355126, 21.sp1 ap353844, 21.sp1 ap355121, 21.sp1 ap355283, 21.sp1 ap355201, 21.sp1 ap355360, 21.sp1 ap355102, 21.sp1 ap355236, 21.sp1 ap354380, 21.sp1 ap355124, 21.sp1 ap355452, 21.sp1 ap355105, 21.sp1 ap355541, 21.sp1 ap355568, 21.sp1 ap355384, 21.sp1 ap355364, 21.sp1 ap355599, 21.sp1 ap355572, 21.sp1 ap355628, 21.sp1 ap355669, 21.sp1 ap355664, 21.sp1 ap355647, 21.sp1 ap355560, 21.sp1 ap355639, 21.sp1 ap357331, 21.sp1 ap355699, 21.sp1 ap357347, 21.sp1 ap357525, 21.sp1 ap357387, 21.sp1 ap357562, 21.sp1 ap357560, 21.sp1 ap357452, 21.sp1 ap355673, 21.sp1 ap357454, 21.sp1 ap355637, 21.sp1 ap357366, 21.sp1 ap357330, 21.sp1 ap357507, 21.sp1 ap357508, 21.sp1 ap355670, 21.sp1 ap357417, 21.sp1 ap355753, 21.sp1 ap355740, 21.sp1 ap357357, 21.sp1 ap357430, 21.sp1 ap355638, 21.sp1 ap356007, 21.sp1 ap356141, 21.sp1 ap355961, 21.sp1 ap356152, 21.sp1 ap356010, 21.sp1 ap355952, 21.sp1 ap356142, 21.sp1 ap356029, 21.sp1 ap355836, 21.sp1 ap355794, 21.sp1 ap356289, 21.sp1 ap356254, 21.sp1 ap356555, 21.sp1 ap356497, 21.sp1 ap356353, 21.sp1 ap356422, 21.sp1 ap357597, 21.sp1 ap356345, 21.sp1 ap355806, 21.sp1 ap355838, 21.sp1 ap356301, 21.sp1 ap357610, 21.sp1 ap356572, 21.sp1 ap356703, 21.sp1 ap356424, 21.sp1 ap356503, 21.sp1 ap355825, 21.sp1 ap357621, 21.sp1 ap356707, 21.sp1 ap357583, 21.sp1 ap356575, 21.sp1 ap356392, 21.sp1 ap356350, 21.sp1 ap356551, 21.sp1 ap357623, 21.sp1 ap356253, 21.sp1 ap356320, 21.sp1 ap355833, 21.sp1 ap356412, 21.sp1 ap356584, 21.sp1 ap357608, 21.sp1 ap357595, 21.sp1 ap356737, 21.sp1 ap357040, 21.sp1 ap355896, 21.sp1 ap356842, 21.sp1 ap357081, 21.sp1 ap357146, 21.sp1 ap356935, 21.sp1 ap357194, 21.sp1 ap357176, 21.sp1 ap357197, 21.sp1 ap357181, 21.sp1 ap357161, 21.sp1 ap357019, 21.sp1 ap356749, 21.sp1 ap355897, 21.sp1 ap356969, 21.sp1 ap356717, 21.sp1 ap356804, 21.sp1 ap357185, 21.sp1 ap357087, 21.sp1 ap356774, 21.sp1 ap357162, 21.sp1 ap356970, 21.sp1 ap357039, 21.sp1 ap359113, 21.sp1 ap357172, 21.sp1 ap357105, 21.sp1 ap357187, 21.sp1 ap359044, 21.sp1 ap359029, 21.sp1 ap359118, 21.sp1 ap359037, 21.sp1 ap358405, 21.sp1 ap358521, 21.sp1 ap358082, 21.sp1 ap358241, 21.sp1 ap358099, 21.sp1 ap358328, 21.sp1 ap358642, 21.sp1 ap358681, 21.sp1 ap358338, 21.sp1 ap358845, 21.sp1 ap358920, 21.sp1 ap358891, 21.sp1 ap358089, 21.sp1 ap358133, 21.sp1 ap358643, 21.sp1 ap358096, 21.sp1 ap358145, 21.sp1 ap358604, 21.sp1 ap358271, 21.sp1 ap358861, 21.sp1 ap358289, 21.sp1 ap358568, 21.sp1 ap358640, 21.sp1 ap358647, 21.sp1 ap358118, 21.sp1 ap358894, 21.sp1 ap358314, 21.sp1 ap358944, 21.sp1 ap357690, 21.sp1 ap358658, 21.sp1 ap357675, 21.sp1 ap357655, 21.sp1 ap358641, 21.sp1 ap358365, 21.sp1 ap357737, 21.sp1 ap358732, 21.sp1 ap359130, 21.sp1 ap359218, 21.sp1 ap359477, 21.sp1 ap359570, 21.sp1 ap359186, 21.sp1 ap358737, 21.sp1 ap359121, 21.sp1 ap359464, 21.sp1 ap358360, 21.sp1 ap359153, 21.sp1 ap359191, 21.sp1 ap359293, 21.sp1 ap359550, 21.sp1 ap359556, 21.sp1 ap359298, 21.sp1 ap359164, 21.sp1 ap357819, 21.sp1 ap357856, 21.sp1 ap357802, 21.sp1 ap359421, 21.sp1 ap359324, 21.sp1 ap357761, 21.sp1 ap358026, 21.sp1 ap357889, 21.sp1 ap358046, 21.sp1 ap358019, 21.sp1 ap358013, 21.sp1 ap360943, 21.sp1 ap360198, 21.sp1 ap361305, 21.sp1 ap361154, 21.sp1 ap361353, 21.sp1 ap360167, 21.sp1 ap361155, 21.sp1 ap360989, 21.sp1 ap360992, 21.sp1 ap359709, 21.sp1 ap359657, 21.sp1 ap360250, 21.sp1 ap359646, 21.sp1 ap361061, 21.sp1 ap360319, 21.sp1 ap361116, 21.sp1 ap360503, 21.sp1 ap360412, 21.sp1 ap361016, 21.sp1 ap361076, 21.sp1 ap360531, 21.sp1 ap360443, 21.sp1 ap360362, 21.sp1 ap360231, 21.sp1 ap361035, 21.sp1 ap360245, 21.sp1 ap360464, 21.sp1 ap359791, 21.sp1 ap359772, 21.sp1 ap361453, 21.sp1 ap360594, 21.sp1 ap359767, 21.sp1 ap360834, 21.sp1 ap360615, 21.sp1 ap361459, 21.sp1 ap360783, 21.sp1 ap360864, 21.sp1 ap360627, 21.sp1 ap360790, 21.sp1 ap360785, 21.sp1 ap360737, 21.sp1 ap360906, 21.sp1 ap361450, 21.sp1 ap361443, 21.sp1 ap359926, 21.sp1 ap359959, 21.sp1 ap359812, 21.sp1 ap359908, 21.sp1 ap360137, 21.sp1 ap359927, 21.sp1 ap359973, 21.sp1 ap359922, 21.sp1 ap359925, 21.sp1 ap359892, 21.sp1 ap359980, 21.sp1 ap361643, 21.sp1 ap361651, 21.sp1 ap361691, 21.sp1 ap361620, 21.sp1 ap361637, 21.sp1 ap362964, 21.sp1 ap361823, 21.sp1 ap361663, 21.sp1 ap361831, 21.sp1 ap363023, 21.sp1 ap362963, 21.sp1 ap361847, 21.sp1 ap363208, 21.sp1 ap363221, 21.sp1 ap363049, 21.sp1 ap363189, 21.sp1 ap363130, 21.sp1 ap363197, 21.sp1 ap363361, 21.sp1 ap363315, 21.sp1 ap363408, 21.sp1 ap362324, 21.sp1 ap362314, 21.sp1 ap362525, 21.sp1 ap362364, 21.sp1 ap362313, 21.sp1 ap363233, 21.sp1 ap363297, 21.sp1 ap363330, 21.sp1 ap363415, 21.sp1 ap362365, 21.sp1 ap362316, 21.sp1 ap363394, 21.sp1 ap363431, 21.sp1 ap363247, 21.sp1 ap362367, 21.sp1 ap363348, 21.sp1 ap361534, 21.sp1 ap361537, 21.sp1 ap363305, 21.sp1 ap361551, 21.sp1 ap361976, 21.sp1 ap362120, 21.sp1 ap362149, 21.sp1 ap362262, 21.sp1 ap362795, 21.sp1 ap362680, 21.sp1 ap362289, 21.sp1 ap362578, 21.sp1 ap362707, 21.sp1 ap363693, 21.sp1 ap363644, 21.sp1 ap362263, 21.sp1 ap361930, 21.sp1 ap362019, 21.sp1 ap362960, 21.sp1 ap362122, 21.sp1 ap362708, 21.sp1 ap363671, 21.sp1 ap362683, 21.sp1 ap363694, 21.sp1 ap362798, 21.sp1 ap362075, 21.sp1 ap363597, 21.sp1 ap362193, 21.sp1 ap361863, 21.sp1 ap362537, 21.sp1 ap362269, 21.sp1 ap361936, 21.sp1 ap362738, 21.sp1 ap361876, 21.sp1 ap362080, 21.sp1 ap363609, 21.sp1 ap362261, 21.sp1 ap362141, 21.sp1 ap363672, 21.sp1 ap362676, 21.sp1 ap363577, 21.sp1 ap363638, 21.sp1 ap362741, 21.sp1 ap365640, 21.sp1 ap364904, 21.sp1 ap365900, 21.sp1 ap365773, 21.sp1 ap365682, 21.sp1 ap365754, 21.sp1 ap363768, 21.sp1 ap365858, 21.sp1 ap363844, 21.sp1 ap365689, 21.sp1 ap363845, 21.sp1 ap363814, 21.sp1 ap363976, 21.sp1 ap363869, 21.sp1 ap365886, 21.sp1 ap363824, 21.sp1 ap363984, 21.sp1 ap363884, 21.sp1 ap364371, 21.sp1 ap364985, 21.sp1 ap365058, 21.sp1 ap365131, 21.sp1 ap365971, 21.sp1 ap365186, 21.sp1 ap365530, 21.sp1 ap366120, 21.sp1 ap365155, 21.sp1 ap364906, 21.sp1 ap364372, 21.sp1 ap365060, 21.sp1 ap365030, 21.sp1 ap365979, 21.sp1 ap366179, 21.sp1 ap364956, 21.sp1 ap364381, 21.sp1 ap365066, 21.sp1 ap365036, 21.sp1 ap365984, 21.sp1 ap365558, 21.sp1 ap364960, 21.sp1 ap366201, 21.sp1 ap365124, 21.sp1 ap365040, 21.sp1 ap364067, 21.sp1 ap364148, 21.sp1 ap364532, 21.sp1 ap364101, 21.sp1 ap364110, 21.sp1 ap364587, 21.sp1 ap364075, 21.sp1 ap364635, 21.sp1 ap364862, 21.sp1 ap364754, 21.sp1 ap364146, 21.sp1 ap364705, 21.sp1 ap364778, 21.sp1 ap364611, 21.sp1 ap364667, 21.sp1 ap366217, 21.sp1 ap364863, 21.sp1 ap364795, 21.sp1 ap364711, 21.sp1 ap364755, 21.sp1 ap366247, 21.sp1 ap364510, 21.sp1 ap364562, 21.sp1 ap366252, 21.sp1 ap364718, 21.sp1 ap364770, 21.sp1 ap364700, 21.sp1 ap364825, 21.sp1 ap364518, 21.sp1 ap364753, 21.sp1 ap364622, 21.sp1 ap364158, 21.sp1 ap364843, 21.sp1 ap363753, 21.sp1 ap364210, 21.sp1 ap364241, 21.sp1 ap364347, 21.sp1 ap364206, 21.sp1 ap364248, 21.sp1 ap366320, 21.sp1 ap366352, 21.sp1 ap364367, 21.sp1 ap366628, 21.sp1 ap366334, 21.sp1 ap366366, 21.sp1 ap366614, 21.sp1 ap366383, 21.sp1 ap366395, 21.sp1 ap366358, 21.sp1 ap366335, 21.sp1 ap366398, 21.sp1 ap366661, 21.sp1 ap366525, 21.sp1 ap366683, 21.sp1 ap366715, 21.sp1 ap366296, 21.sp1 ap367347, 21.sp1 ap367406, 21.sp1 ap366797, 21.sp1 ap366731, 21.sp1 ap367413, 21.sp1 ap366835, 21.sp1 ap367895, 21.sp1 ap369276, 21.sp1 ap368179, 21.sp1 ap368153, 21.sp1 ap368306, 21.sp1 ap367419, 21.sp1 ap368352, 21.sp1 ap366807, 21.sp1 ap367810, 21.sp1 ap369284, 21.sp1 ap368195, 21.sp1 ap368127, 21.sp1 ap367827, 21.sp1 ap368000, 21.sp1 ap369300, 21.sp1 ap366411, 21.sp1 ap367477, 21.sp1 ap367488, 21.sp1 ap366443, 21.sp1 ap369881, 21.sp1 ap369127, 21.sp1 ap369763, 21.sp1 ap368651, 21.sp1 ap368854, 21.sp1 ap369489, 21.sp1 ap367781, 21.sp1 ap368682, 21.sp1 ap369581, 21.sp1 ap368874, 21.sp1 ap369509, 21.sp1 ap368517, 21.sp1 ap369770, 21.sp1 ap369885, 21.sp1 ap369623, 21.sp1 ap368503, 21.sp1 ap367547, 21.sp1 ap369021, 21.sp1 ap369136, 21.sp1 ap368827, 21.sp1 ap368458, 21.sp1 ap369675, 21.sp1 ap368590, 21.sp1 ap369521, 21.sp1 ap369926, 21.sp1 ap369775, 21.sp1 ap369035, 21.sp1 ap368634, 21.sp1 ap368830, 21.sp1 ap367487, 21.sp1 ap369928, 21.sp1 ap369783, 21.sp1 ap366999, 21.sp1 ap367222, 21.sp1 ap366905, 21.sp1 ap367324, 21.sp1 ap367639, 21.sp1 ap367007, 21.sp1 ap367332, 21.sp1 ap366968, 21.sp1 ap367263, 21.sp1 ap367325, 21.sp1 ap366836, 21.sp1 ap369580, 21.sp1 ap369731, 21.sp1 ap367292, 21.sp1 ap367129, 21.sp1 ap366984, 21.sp1 ap367307, 21.sp1 ap366982, 21.sp1 ap374641, 21.sp1 ap375370, 21.sp1 ap374794, 21.sp1 ap374355, 21.sp1 ap374472, 21.sp1 ap375207, 21.sp1 ap374480, 21.sp1 ap374411, 21.sp1 ap374286, 21.sp1 ap374649, 21.sp1 ap374786, 21.sp1 ap375351, 21.sp1 ap375039, 21.sp1 ap374869, 21.sp1 ap375382, 21.sp1 ap374255, 21.sp1 ap374315, 21.sp1 ap375060, 21.sp1 ap375094, 21.sp1 ap374249, 21.sp1 ap375153, 21.sp1 ap374454, 21.sp1 ap371992, 21.sp1 ap371506, 21.sp1 ap374600, 21.sp1 ap374793, 21.sp1 ap371365, 21.sp1 ap375205, 21.sp1 ap372107, 21.sp1 ap372422, 21.sp1 ap373294, 21.sp1 ap373534, 21.sp1 ap372533, 21.sp1 ap372453, 21.sp1 ap374892, 21.sp1 ap373137, 21.sp1 ap372796, 21.sp1 ap372015, 21.sp1 ap373047, 21.sp1 ap373330, 21.sp1 ap372623, 21.sp1 ap372405, 21.sp1 ap373182, 21.sp1 ap372578, 21.sp1 ap372110, 21.sp1 ap372207, 21.sp1 ap373197, 21.sp1 ap373332, 21.sp1 ap372610, 21.sp1 ap372420, 21.sp1 ap372432, 21.sp1 ap372480, 21.sp1 ap372345, 21.sp1 ap372622, 21.sp1 ap372436, 21.sp1 ap372077, 21.sp1 ap372505, 21.sp1 ap373786, 21.sp1 ap370194, 21.sp1 ap369997, 21.sp1 ap370147, 21.sp1 ap371768, 21.sp1 ap370249, 21.sp1 ap371886, 21.sp1 ap370329, 21.sp1 ap370195, 21.sp1 ap371527, 21.sp1 ap371582, 21.sp1 ap370036, 21.sp1 ap371977, 21.sp1 ap371917, 21.sp1 ap370218, 21.sp1 ap371721, 21.sp1 ap371956, 21.sp1 ap370017, 21.sp1 ap371804, 21.sp1 ap371982, 21.sp1 ap371922, 21.sp1 ap371634, 21.sp1 ap370085, 21.sp1 ap371612, 21.sp1 ap371868, 21.sp1 ap372850, 21.sp1 ap370347, 21.sp1 ap373875, 21.sp1 ap374162, 21.sp1 ap374131, 21.sp1 ap373882, 21.sp1 ap373004, 21.sp1 ap374055, 21.sp1 ap373872, 21.sp1 ap373861, 21.sp1 ap374037, 21.sp1 ap374122, 21.sp1 ap371281, 21.sp1 ap370936, 21.sp1 ap371030, 21.sp1 ap371254, 21.sp1 ap370607, 21.sp1 ap371258, 21.sp1 ap370362, 21.sp1 ap370538, 21.sp1 ap370539, 21.sp1 ap371058, 21.sp1 ap370442, 21.sp1 ap371259, 21.sp1 ap376817, 21.sp1 ap376706, 21.sp1 ap376935, 21.sp1 ap376594, 21.sp1 ap370908, 21.sp1 ap376666, 21.sp1 ap371233, 21.sp1 ap376156, 21.sp1 ap376317, 21.sp1 ap376001, 21.sp1 ap377033, 21.sp1 ap376696, 21.sp1 ap376889, 21.sp1 ap376798, 21.sp1 ap376042, 21.sp1 ap376809, 21.sp1 ap376024, 21.sp1 ap376308, 21.sp1 ap376699, 21.sp1 ap376934, 21.sp1 ap370720, 21.sp1 ap380155, 21.sp1 ap375430, 21.sp1 ap379493, 21.sp1 ap375466, 21.sp1 ap383380, 21.sp9 ap356817, 21.sp9 ap360362, 21.sp9 ap355353, 21.sp9 ap349872, 21.sp9 ap361945, 21.sp1 ap375398, 21.sp9 ap350799, 21.sp9 ap359029, 21.sp9 ap352337, 21.sp9 ap363332, 21.sp9 ap371587, 21.sp9 ap351160, 21.sp9 ap359674, 21.sp9 ap369134, 21.sp9 ap368399, 21.sp9 ap375382, 21.sp9 ap352372, 21.sp9 ap373875, 21.sp9 ap355774, 21.sp9 ap357347, 21.sp9 ap375625, 21.sp9 ap372098, 21.sp9 ap374131, 21.sp1 ap379600, 21.sp9 ap364239, 21.sp9 ap350032, 21.sp9 ap360401, 21.sp9 ap343774, 21.sp9, 21.sp9 ap362075, 21.sp1 ap380506, 21.sp9 ap351248, 21.sp9 ap354646, 21.sp9 ap362575, 21.sp9 ap360506, 21.sp9 ap350110, 21.sp9 ap374965, 21.sp9 ap357436, 21.sp1 ap379775, 21.sp9 ap360116, 21.sp9 ap356253, 21.sp9 ap366880, 21.sp9 ap369748, 21.sp9 ap376766, 21.sp9 ap356749, 21.sp9 ap347741, 21.sp9 ap360250, 21.sp9 ap358886, 21.sp9 ap355300, 21.sp9 ap372623, 21.sp9 ap352304, 21.sp9 ap350573, 21.sp9 ap377934, 21.sp9 ap360912, 21.sp9 ap375217, 21.sp1 ap377241, 21.sp9 ap369881, 21.sp1 ap378154, 21.sp1 ap377737, 21.sp9 ap362582, 21.sp1 ap378886, 21.sp9 ap373770, 21.sp9 ap367207, 21.sp1 ap377555, 21.sp1 ap378818, 21.sp1 ap378029, 21.sp1 ap377569, 21.sp1 ap378143, 21.sp1 ap378242, 21.sp1 ap377091, 21.sp1 ap379201, 21.sp1 ap377656, 21.sp1 ap378144, 21.sp1 ap375748, 21.sp1 ap375625, 21.sp1 ap375502, 21.sp1 ap375661, 21.sp1 ap375539, 21.sp1 ap375469, 21.sp1 ap375603, 21.sp1 ap375488, 21.0 ap339021, 21.0 ap342832, 21.0 ap344457, 21.0 ap349623, 21.0 ap350090, 21.0 ap355806, 21.0 ap356422, 21.0 ap362262, 21.sp1 ap342851, 21.sp1 ap343504, 21.sp1 ap343782, 21.sp1 ap345470, 21.sp1 ap347008, 21.sp1 ap348761, 21.sp1 ap351956, 21.sp1 ap352170, 21.sp1 ap356752, 21.sp1 ap358095, 21.sp1 ap358137, 21.sp1 ap365257, 21.sp1 ap369784, 21.sp1 ap373016, 21.sp9 ap378993, RI.2021.02, RI.2021.08, RI.2021.09, RI.2021.10, RI.2021.11, RI.2021.12, RI.2022.02, RI.2022.03, RI.2022.04, RI.2022.07, RI.2022.06, RI.2022.05, RI.2022.08, RI.2022.09, RI.2022.10, RI.2022.12, RI.2023.01, RI.2023.03, RI.2023.02, RI.2023.04'}
CVE-2023-20705
In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767870; Issue ID: ALPS07767870.
https://corp.mediatek.com/product-security-bulletin/May-2023
2022-10-28T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT8183, MT8195', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20586
A potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007
2022-10-27T18:53:39.759Z
2023-08-08T17:05:16.338Z
2023-08-08T17:05:16.338Z
{'Vendor': 'AMD', 'Product': 'Radeon™ Software Crimson ReLive Edition', 'Versions': 'Various '}
CVE-2023-20139
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business RV Series Router Firmware ', 'Versions': 'n/a'}
CVE-2023-20569
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005
2022-10-27T18:53:39.754Z
2023-08-08T17:02:11.318Z
2023-08-08T17:02:11.318Z
{'Vendor': 'AMD', 'Product': 'Ryzen™ 3000 Series Desktop Processors', 'Versions': 'various '}
CVE-2023-20990
In btm_ble_rand_enc_complete of btm_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260568354
https://source.android.com/security/bulletin/pixel/2023-06-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20138
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business RV Series Router Firmware ', 'Versions': 'n/a'}
CVE-2023-20568
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003
2022-10-27T18:53:39.754Z
2023-11-14T18:51:35.466Z
2023-11-14T18:51:35.466Z
{'Vendor': ' AMD', 'Product': 'Radeon™ RX 5000/6000/7000 Series Graphics Cards ', 'Versions': 'various '}
CVE-2023-20991
In btm_ble_process_periodic_adv_sync_lost_evt of ble_scanner_hci_interface.cc , there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-255305114
https://source.android.com/security/bulletin/pixel/2023-06-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20641
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629574; Issue ID: ALPS07629574.
https://corp.mediatek.com/product-security-bulletin/March-2023
2022-10-28T00:00:00
2023-03-07T00:00:00
2023-05-09T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6879, MT6895, MT6983, MT8791, MT8791T, MT8797', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20211
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-injection-g6MbwH2
2022-10-27T18:47:50.367Z
2023-08-16T21:43:23.085Z
2024-01-25T16:58:18.926Z
{'Vendor': 'Cisco', 'Product': 'Cisco Unified Communications Manager', 'Versions': '12.0(1)SU1, 12.0(1)SU2, 12.0(1)SU3, 12.0(1)SU4, 12.0(1)SU5, 12.5(1), 12.5(1)SU1, 12.5(1)SU2, 12.5(1)SU3, 12.5(1)SU4, 12.5(1)SU5, 12.5(1)SU6, 12.5(1)SU7, 12.5(1)SU7a, 14, 14SU1, 14SU2, 14SU3'}
CVE-2023-20704
In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767826; Issue ID: ALPS07767826.
https://corp.mediatek.com/product-security-bulletin/May-2023
2022-10-28T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT8183, MT8195', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20180
A vulnerability in the web interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web interface on an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions. These actions could include joining meetings and scheduling training sessions.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxsscsrf-2L24bBx6
2022-10-27T18:47:50.363Z
2023-07-07T19:47:26.261Z
2024-01-25T16:57:51.263Z
{'Vendor': 'Cisco', 'Product': 'Cisco Webex Meetings', 'Versions': '39.10, 39.11, 39.6, 39.7, 39.7.4, 39.7.7, 39.8, 39.8.2, 39.8.3, 39.8.4, 39.9, 39.9.1, 40.1, 40.2, 40.4, 40.4.10, 40.6, 40.6.2, 42.10, 42.11, 42.6, 42.9, 42.12, 42.8, 42.7, 43.2, 43.1, 43.3, 43.4, 43.4.2, 43.5.0, 43.4.1'}
CVE-2023-20883
In Spring Boot versions 3.0.0 - 3.0.6, 2.7.0 - 2.7.11, 2.6.0 - 2.6.14, 2.5.0 - 2.5.14 and older unsupported versions, there is potential for a denial-of-service (DoS) attack if Spring MVC is used together with a reverse proxy cache.
https://spring.io/security/cve-2023-20883
2022-11-01T00:00:00
2023-05-26T00:00:00
2023-07-03T00:00:00
{'Vendor': 'n/a', 'Product': 'Spring Boot', 'Versions': 'Spring Boot versions 3.0.0 - 3.0.6, 2.7.0 - 2.7.11, 2.6.0 - 2.6.14, 2.5.0 - 2.5.14 and older unsupported versions'}
CVE-2023-20929
In sendHalfSheetCancelBroadcast of HalfSheetActivity.java, there is a possible way to learn nearby BT MAC addresses due to an unrestricted broadcast intent. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-234442700
https://source.android.com/security/bulletin/2023-03-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20246
Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snort3acp-bypass-3bdR2BEh
2022-10-27T18:47:50.371Z
2023-11-01T17:13:58.231Z
2024-01-25T16:58:30.989Z
{'Vendor': 'Cisco', 'Product': 'Cisco Firepower Threat Defense Software', 'Versions': '7.0.0, 7.0.0.1, 7.0.1, 7.0.1.1, 7.0.2, 7.0.2.1, 7.0.3, 7.0.4, 7.0.5, 7.1.0, 7.1.0.1, 7.1.0.2, 7.1.0.3, 7.2.0, 7.2.0.1, 7.2.1, 7.2.2, 7.2.3, 7.3.0, 7.3.1, 7.3.1.1'}
CVE-2023-20616
In ion, there is a possible out of bounds read due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560720; Issue ID: ALPS07560720.
https://corp.mediatek.com/product-security-bulletin/February-2023
2022-10-28T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8168, MT8183, MT8321, MT8365, MT8385, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8791T, MT8797', 'Versions': 'Android 11.0, 12.0'}
CVE-2023-20753
In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07588667.
https://corp.mediatek.com/product-security-bulletin/July-2023
2022-10-28T02:03:10.771Z
2023-07-04T01:44:07.720Z
2023-07-04T01:44:07.720Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797', 'Versions': 'Android 11.0, 12.0, 13.0'}
CVE-2023-20895
The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.
https://www.vmware.com/security/advisories/VMSA-2023-0014.html
2022-11-01T15:41:50.395Z
2023-06-22T11:57:15.954Z
2023-06-22T11:57:15.954Z
{'Vendor': 'VMware', 'Product': 'VMware vCenter Server (vCenter Server)', 'Versions': '8.0, 7.0'}
CVE-2023-20196
Two vulnerabilities in Cisco ISE could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. These vulnerabilities are due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit these vulnerabilities by uploading a crafted file to an affected device. A successful exploit could allow the attacker to store malicious files in specific directories on the device. The attacker could later use those files to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs
2022-10-27T18:47:50.365Z
2023-11-01T17:01:34.690Z
2024-01-25T16:57:54.983Z
{'Vendor': 'Cisco', 'Product': 'Cisco Identity Services Engine Software', 'Versions': '2.6.0, 2.6.0 p1, 2.6.0 p2, 2.6.0 p3, 2.6.0 p5, 2.6.0 p6, 2.6.0 p7, 2.6.0 p8, 2.6.0 p9, 2.6.0 p10, 2.6.0 p11, 2.6.0 p12, 2.7.0, 2.7.0 p1, 2.7.0 p2, 2.7.0 p3, 2.7.0 p4, 2.7.0 p5, 2.7.0 p6, 2.7.0 p7, 2.7.0 p9, 3.0.0, 3.0.0 p1, 3.0.0 p2, 3.0.0 p3, 3.0.0 p4, 3.0.0 p5, 3.0.0 p6, 3.0.0 p7, 3.1.0, 3.1.0 p1, 3.1.0 p3, 3.1.0 p4, 3.1.0 p5, 3.1.0 p6, 3.1.0 p7, 3.2.0, 3.2.0 p1, 3.2.0 p2'}
CVE-2023-20179
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content. This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-html-3ZKh8d6x
2022-10-27T18:47:50.363Z
2023-09-27T17:24:32.381Z
2024-01-25T16:57:50.945Z
{'Vendor': 'Cisco', 'Product': 'Cisco SD-WAN vManage', 'Versions': '20.3.1, 20.3.2, 20.3.2.1, 20.3.3, 20.3.3.1, 20.3.4, 20.3.4.1, 20.3.4.2, 20.3.5, 20.3.6, 20.3.7, 20.3.7.1, 20.3.4.3, 20.3.5.1, 20.3.7.2, 20.4.1, 20.4.1.1, 20.4.1.2, 20.4.2, 20.4.2.2, 20.4.2.1, 20.4.2.3, 20.5.1, 20.5.1.2, 20.5.1.1, 20.6.1, 20.6.1.1, 20.6.2.1, 20.6.2.2, 20.6.2, 20.6.3, 20.6.3.1, 20.6.4, 20.6.5, 20.6.5.1, 20.6.1.2, 20.6.3.2, 20.6.4.1, 20.6.5.2, 20.6.5.4, 20.6.3.3, 20.6.4.2, 20.6.3.0.45, 20.6.3.0.46, 20.6.3.0.47, 20.6.3.4, 20.6.4.0.21, 20.6.5.1.10, 20.6.5.1.7, 20.6.5.1.9, 20.6.5.2.4, 20.6.5.5, 20.7.1, 20.7.1.1, 20.7.2, 20.8.1, 20.9.1, 20.9.2, 20.9.2.1, 20.9.3, 20.9.3.1, 20.9.2.3, 20.9.3.0.12, 20.9.3.0.16, 20.9.3.0.17, 20.9.3.0.18, 20.9.3.2, 20.9.3.2_LI_Images, 20.9.4, 20.10.1, 20.10.1.1, 20.10.1.2, 20.11.1, 20.11.1.1, 20.11.1.2'}
CVE-2023-20529
Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032
2022-10-27T18:53:39.738Z
2023-01-10T20:57:04.799Z
2023-01-11T07:01:59.843980Z
{'Vendor': ' AMD', 'Product': '2nd Gen EPYC', 'Versions': 'various '}
CVE-2023-20250
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code with root privileges on an affected device. To exploit this vulnerability, the attacker must have valid Administrator credentials on the affected device.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-stack-SHYv2f5N
2022-10-27T18:47:50.371Z
2023-09-06T16:59:25.474Z
2024-01-25T16:58:31.808Z
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business RV Series Router Firmware', 'Versions': '1.0.0.30, 1.0.0.2, 1.0.0.21, 1.0.1.1, 1.0.1.3, 1.0.1.6, 1.0.1.99, 1.0.2.7, 1.0.2.99, 1.0.3.14, 1.0.3.16, 1.0.3.22, 1.0.3.28, 1.0.3.44, 1.0.3.45, 1.0.3.51, 1.0.3.52, 1.0.3.54, 1.0.3.55, 1.1.0.5, 1.1.0.6, 1.1.0.9, 1.2.0.10, 1.2.0.14, 1.2.0.15, 1.2.0.8, 1.2.0.9, 1.2.0.99, 1.2.1.4, 1.2.1.7, 1.2.2.1, 1.2.2.4, 1.2.2.5, 1.2.2.8, 1.3.0.4, 1.3.0.7, 1.3.0.8, 1.3.0.99, 1.3.1.1, 1.3.1.4, 1.3.1.5, 1.3.1.7'}
CVE-2023-20745
In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07560694.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.769Z
2023-06-06T12:11:41.174Z
2023-06-06T12:11:41.174Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6789, MT6855, MT8185, MT8195, MT8365, MT8395, MT8781, MT8786, MT8789, MT8791, MT8797', 'Versions': 'Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2'}
CVE-2023-20968
In multiple functions of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235935
https://source.android.com/security/bulletin/pixel/2023-06-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20987
In btm_read_link_quality_complete of btm_acl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over Bluetooth with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260569414
https://source.android.com/security/bulletin/pixel/2023-06-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20084
A vulnerability in the endpoint software of Cisco Secure Endpoint for Windows could allow an authenticated, local attacker to evade endpoint protection within a limited time window. This vulnerability is due to a timing issue that occurs between various software components. An attacker could exploit this vulnerability by persuading a user to put a malicious file into a specific folder and then persuading the user to execute the file within a limited time window. A successful exploit could allow the attacker to cause the endpoint software to fail to quarantine the malicious file or kill its process. Note: This vulnerability only applies to deployments that have the Windows Folder Redirection feature enabled.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-endpoint-dos-RzOgFKnd
2022-10-27T18:47:50.334Z
2023-11-22T17:09:38.783Z
2024-01-25T16:57:42.470Z
{'Vendor': 'Cisco', 'Product': 'Cisco Secure Endpoint', 'Versions': '6.0.9, 6.0.7, 6.1.5, 6.1.7, 6.1.9, 6.2.1, 6.2.5, 6.2.19, 6.2.3, 6.2.9, 6.3.5, 6.3.1, 6.3.7, 6.3.3, 7.0.5, 7.1.1, 7.1.5, 7.2.13, 7.2.7, 7.2.3, 7.2.11, 7.2.5, 7.3.1, 7.3.9, 7.3.3, 7.3.5, 8.1.7, 8.1.5, 8.1.3.21242, 8.1.7.21512, 8.1.3, 8.1.5.21322, 8.1.7.21417'}
CVE-2023-20207
A vulnerability in the logging component of Cisco Duo Authentication Proxy could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. This vulnerability exists because certain unencrypted credentials are stored. An attacker could exploit this vulnerability by accessing the logs on an affected system and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to view sensitive information in clear text.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-auth-info-JgkSWBLz
2022-10-27T18:47:50.367Z
2023-07-12T13:51:48.952Z
2024-01-25T16:57:59.633Z
{'Vendor': 'Cisco', 'Product': 'Cisco Duo Authentication Proxy', 'Versions': '2.10.0, 2.10.1, 2.11.0, 2.12.0, 2.12.1, 2.13.0, 2.14.0, 2.4.10, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.14.1, 2.4.15, 2.4.16, 2.4.17, 2.4.18, 2.4.19, 2.4.2, 2.4.20, 2.4.21, 2.4.3, 2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.5.4, 2.6.0, 2.7.0, 2.8.1, 2.9.0, 3.0.0, 3.1.0, 3.1.1, 3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.2.4, 4.0.0, 4.0.1, 4.0.2, 5.0.0, 5.0.1, 5.0.2, 5.1.0, 5.1.1, 5.2.0, 5.2.1, 5.2.2, 5.3.0, 5.3.1, 5.4.0, 5.4.1, 5.5.0, 5.5.1, 5.6.0, 5.6.1'}
CVE-2023-20657
In mtee, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07571485; Issue ID: ALPS07571485.
https://corp.mediatek.com/product-security-bulletin/April-2023
2022-10-28T00:00:00
2023-04-06T00:00:00
2023-04-06T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6983, MT8321, MT8385, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8797, MT8798', 'Versions': 'Android 10.0, 11.0, 12.0, 13.0'}
CVE-2023-20712
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796914; Issue ID: ALPS07796914.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.760Z
2023-06-06T12:11:55.253Z
2023-06-06T12:11:55.253Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT5221, MT6789, MT6855, MT6879, MT6895, MT6983, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8168, MT8175, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8673, MT8695, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797', 'Versions': 'Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2 / Linux 4.19 (For MT5221 only)'}
CVE-2023-20856
VMware vRealize Operations (vROps) contains a CSRF bypass vulnerability. A malicious user could execute actions on the vROps platform on behalf of the authenticated victim user.
https://www.vmware.com/security/advisories/VMSA-2023-0002.html
2022-11-01T00:00:00
2023-02-01T00:00:00
2023-02-01T00:00:00
{'Vendor': 'n/a', 'Product': 'VMware vRealize Operations (vROps)', 'Versions': 'vRealize Operations Manager (vROps) 8.6.4'}
CVE-2023-20155
A vulnerability in a logging API in Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause the device to become unresponsive or trigger an unexpected reload. This vulnerability could also allow an attacker with valid user credentials, but not Administrator privileges, to view a system log file that they would not normally have access to. This vulnerability is due to a lack of rate-limiting of requests that are sent to a specific API that is related to an FMC log. An attacker could exploit this vulnerability by sending a high rate of HTTP requests to the API. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the FMC CPU spiking to 100 percent utilization or to the device reloading. CPU utilization would return to normal if the attack traffic was stopped before an unexpected reload was triggered.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-logview-dos-AYJdeX55
2022-10-27T18:47:50.359Z
2023-11-01T16:48:10.250Z
2024-01-25T16:57:48.358Z
{'Vendor': 'Cisco', 'Product': 'Cisco Firepower Management Center', 'Versions': '6.2.3, 6.2.3.1, 6.2.3.2, 6.2.3.3, 6.2.3.4, 6.2.3.5, 6.2.3.6, 6.2.3.7, 6.2.3.9, 6.2.3.10, 6.2.3.11, 6.2.3.12, 6.2.3.13, 6.2.3.14, 6.2.3.15, 6.2.3.8, 6.2.3.16, 6.2.3.17, 6.2.3.18, 6.4.0, 6.4.0.1, 6.4.0.3, 6.4.0.2, 6.4.0.4, 6.4.0.5, 6.4.0.6, 6.4.0.7, 6.4.0.8, 6.4.0.9, 6.4.0.10, 6.4.0.11, 6.4.0.12, 6.4.0.13, 6.4.0.14, 6.4.0.15, 6.4.0.16, 6.6.0, 6.6.0.1, 6.6.1, 6.6.3, 6.6.4, 6.6.5, 6.6.5.1, 6.6.5.2, 6.6.7, 6.6.7.1, 6.7.0, 6.7.0.1, 6.7.0.2, 6.7.0.3, 7.0.0, 7.0.0.1, 7.0.1, 7.0.1.1, 7.0.2, 7.0.2.1, 7.0.3, 7.0.4, 7.0.5, 7.1.0, 7.1.0.1, 7.1.0.2, 7.1.0.3, 7.2.0, 7.2.1, 7.2.2, 7.2.0.1, 7.2.3, 7.2.3.1, 7.3.0, 7.3.1, 7.3.1.1'}
CVE-2023-20010
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface inadequately validates user input. An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to read or modify any data on the underlying database or elevate their privileges.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-sql-rpPczR8n
2022-10-27T18:47:50.307Z
2023-01-19T01:32:08.418Z
2024-01-25T16:57:30.637Z
{'Vendor': 'Cisco', 'Product': 'Cisco Unified Communications Manager', 'Versions': '12.0(1)SU1, 12.0(1)SU2, 12.0(1)SU3, 12.0(1)SU4, 12.0(1)SU5, 12.5(1), 12.5(1)SU1, 12.5(1)SU2, 12.5(1)SU3, 12.5(1)SU4, 12.5(1)SU5, 12.5(1)SU6, 14, 14SU1, 14SU2'}
CVE-2023-20913
In onCreate of PhoneAccountSettingsActivity.java and related files, there is a possible way to mislead the user into enabling a malicious phone account due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246933785
https://source.android.com/security/bulletin/2023-01-01
2022-11-03T00:00:00
2023-01-24T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-10 Android-11 Android-12 Android-12L Android-13'}
CVE-2023-20786
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767811; Issue ID: ALPS07767811.
https://corp.mediatek.com/product-security-bulletin/August-2023
2022-10-28T02:03:10.777Z
2023-08-07T03:21:12.540Z
2023-08-07T03:21:12.540Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT2713, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8175, MT8188, MT8195, MT8362A, MT8365, MT8673', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20102
A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system. This vulnerability is due to insufficient sanitization of user-provided data that is parsed into system memory. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the administrator user.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealthsmc-rce-sfNBPjcS
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Secure Network Analytics ', 'Versions': 'n/a'}
CVE-2023-20801
In imgsys, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420968.
https://corp.mediatek.com/product-security-bulletin/August-2023
2022-10-28T02:03:10.781Z
2023-08-07T03:21:40.073Z
2023-08-07T03:21:40.073Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781', 'Versions': 'Android 12.0, 13.0 / IOT-v23.0 (Yocto 4.0)'}
CVE-2023-20944
In run of ChooseTypeAndAccountActivity.java, there is a possible escalation of privilege due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-244154558
https://source.android.com/security/bulletin/2023-02-01
2022-11-03T00:00:00
2023-02-28T00:00:00
2023-02-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-10 Android-11 Android-12 Android-12L Android-13'}
CVE-2023-20047
A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco Webex Room Phone and Cisco Webex Share devices could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient resource allocation. An attacker could exploit this vulnerability by sending crafted LLDP traffic to an affected device. A successful exploit could allow the attacker to exhaust the memory resources of the affected device, resulting in a crash of the LLDP process. If the affected device is configured to support LLDP only, this could cause an interruption to inbound and outbound calling. By default, these devices are configured to support both Cisco Discovery Protocol and LLDP. To recover operational state, the affected device needs a manual restart.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lldp-memlk-McOecPT
2022-10-27T18:47:50.317Z
2023-01-19T01:36:07.348Z
2024-01-25T16:57:38.362Z
{'Vendor': 'Cisco', 'Product': 'Cisco Webex Room Phone', 'Versions': 'RoomPhone 1.1.0, RoomPhone 1.2.0, RoomPhone 1.2.0SR1, RoomPhone 1.2.0SR2'}
CVE-2023-20694
In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07733998 / ALPS07874388 (For MT6880 and MT6890 only); Issue ID: ALPS07733998 / ALPS07874388 (For MT6880 and MT6890 only).
https://corp.mediatek.com/product-security-bulletin/May-2023
2022-10-28T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6739, MT6761, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6789, MT6853, MT6855, MT6873, MT6879, MT6880, MT6885, MT6890, MT6895, MT6983, MT8167, MT8175, MT8185, MT8195, MT8321, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797', 'Versions': 'Android 12.0, 13.0 / OpenWrt 19.07, 21.02'}
CVE-2023-20817
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453600; Issue ID: ALPS07453600.
https://corp.mediatek.com/product-security-bulletin/August-2023
2022-10-28T02:03:23.673Z
2023-08-07T03:22:14.021Z
2023-08-07T03:22:14.021Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20114
A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-download-7js4ug2J
2022-10-27T18:47:50.344Z
2023-11-01T16:43:43.745Z
2024-01-25T16:57:45.849Z
{'Vendor': 'Cisco', 'Product': 'Cisco Firepower Management Center', 'Versions': '6.7.0, 6.7.0.1, 6.7.0.2, 6.7.0.3, 7.0.0, 7.0.0.1, 7.0.1, 7.0.1.1, 7.0.2, 7.0.2.1, 7.0.3, 7.0.4, 7.0.5, 7.1.0, 7.1.0.1, 7.1.0.2, 7.1.0.3, 7.2.0, 7.2.1, 7.2.2, 7.2.0.1, 7.2.3, 7.2.3.1, 7.3.0, 7.3.1, 7.3.1.1'}
CVE-2023-20051
A vulnerability in the Vector Packet Processor (VPP) of Cisco Packet Data Network Gateway (PGW) could allow an unauthenticated, remote attacker to stop ICMP traffic from being processed over an IPsec connection. This vulnerability is due to the VPP improperly handling a malformed packet. An attacker could exploit this vulnerability by sending a malformed Encapsulating Security Payload (ESP) packet over an IPsec connection. A successful exploit could allow the attacker to stop ICMP traffic over an IPsec connection and cause a denial of service (DoS).
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-pdng-dos-KmzwEy2Q
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco ASR 5000 Series Software ', 'Versions': 'n/a'}
CVE-2023-20952
In A2DP_BuildCodecHeaderSbc of a2dp_sbc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-186803518
https://source.android.com/security/bulletin/2023-03-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-11 Android-12 Android-12L Android-13'}
CVE-2023-20682
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441605; Issue ID: ALPS07441605.
https://corp.mediatek.com/product-security-bulletin/April-2023
2022-10-28T00:00:00
2023-04-06T00:00:00
2023-04-06T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT5221, MT6580, MT6735, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6983, MT7663, MT7668, MT7902, MT7921, MT7933, MT8167S, MT8168, MT8169, MT8175, MT8185, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8675, MT8695, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798', 'Versions': 'Android 11.0, 12.0, 13.0 / Yocto 3.1, 3.3, 4.0 / Linux-4.19 (for MT5221, MT7663, MT7668, MT7902 and MT7921 chipsets only)'}
CVE-2023-20728
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573603; Issue ID: ALPS07573603.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.766Z
2023-06-06T12:11:07.153Z
2023-06-06T12:11:07.153Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6781, MT6789, MT6833, MT6835, MT6855, MT6877, MT6879, MT6886, MT6895, MT6983, MT6985, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8168, MT8175, MT8185, MT8195, MT8362A, MT8365, MT8385, MT8395, MT8518, MT8532, MT8673, MT8675, MT8695, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797', 'Versions': 'Android 12.0, 13.0 / Yocto 3.1, 3.3, 4.0'}
CVE-2023-20143
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business RV Series Router Firmware ', 'Versions': 'n/a'}
CVE-2023-20840
In imgsys, there is a possible out of bounds read and write due to a missing valid range checking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07326430; Issue ID: ALPS07326430.
https://corp.mediatek.com/product-security-bulletin/September-2023
2022-10-28T02:03:23.690Z
2023-09-04T02:27:48.606Z
2023-09-04T02:27:48.606Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6895, MT6897, MT6983, MT8188, MT8195, MT8395', 'Versions': 'Android 11.0, 12.0 / Linux 6.1 / IOT-v23.0 / Yocto 4.0'}
CVE-2023-20905
In Mfc_Transceive of phNxpExtns_MifareStd.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-241387741
https://source.android.com/security/bulletin/2023-01-01
2022-11-03T00:00:00
2023-01-24T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-10'}
CVE-2023-20006
A vulnerability in the hardware-based SSL/TLS cryptography functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Appliances could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to an implementation error within the cryptographic functions for SSL/TLS traffic processing when they are offloaded to the hardware. An attacker could exploit this vulnerability by sending a crafted stream of SSL/TLS traffic to an affected device. A successful exploit could allow the attacker to cause an unexpected error in the hardware-based cryptography engine, which could cause the device to reload.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssl-dos-uu7mV5p6
2022-10-27T00:00:00
2023-06-28T00:00:00
2024-01-25T16:57:29.395Z
{'Vendor': 'Cisco', 'Product': 'Cisco Adaptive Security Appliance (ASA) Software', 'Versions': '9.16.4, 9.18.2, 9.18.2.5'}
CVE-2023-20790
In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07740194; Issue ID: ALPS07740194.
https://corp.mediatek.com/product-security-bulletin/August-2023
2022-10-28T02:03:10.778Z
2023-08-07T03:21:22.382Z
2023-08-07T03:21:22.382Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT2713, MT2735, MT2737, MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797', 'Versions': 'Android 12.0, 13.0 / OpenWrt 19.07, 21.02 / RDK-B 22Q3 / Yocto 2.6, 3.3'}
CVE-2023-20708
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07581655; Issue ID: ALPS07581655.
https://corp.mediatek.com/product-security-bulletin/May-2023
2022-10-28T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797', 'Versions': 'Android 11.0, 12.0, 13.0'}
CVE-2023-20071
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ftd-zXYtnjOM
2022-10-27T18:47:50.328Z
2023-11-01T17:07:44.528Z
2024-01-25T16:57:41.206Z
{'Vendor': 'Cisco', 'Product': 'Cisco Firepower Threat Defense Software', 'Versions': '6.2.3, 6.2.3.1, 6.2.3.2, 6.2.3.3, 6.2.3.4, 6.2.3.5, 6.2.3.6, 6.2.3.7, 6.2.3.8, 6.2.3.10, 6.2.3.11, 6.2.3.9, 6.2.3.12, 6.2.3.13, 6.2.3.14, 6.2.3.15, 6.2.3.16, 6.2.3.17, 6.2.3.18, 6.6.0, 6.6.0.1, 6.6.1, 6.6.3, 6.6.4, 6.6.5, 6.6.5.1, 6.6.5.2, 6.6.7, 6.6.7.1, 6.4.0, 6.4.0.1, 6.4.0.3, 6.4.0.2, 6.4.0.4, 6.4.0.5, 6.4.0.6, 6.4.0.7, 6.4.0.8, 6.4.0.9, 6.4.0.10, 6.4.0.11, 6.4.0.12, 6.4.0.13, 6.4.0.14, 6.4.0.15, 6.4.0.16, 6.7.0, 6.7.0.1, 6.7.0.2, 6.7.0.3, 7.0.0, 7.0.0.1, 7.0.1, 7.0.1.1, 7.0.2, 7.0.2.1, 7.0.3, 7.0.4, 7.0.5, 7.1.0, 7.1.0.1, 7.1.0.2, 7.1.0.3, 7.2.0, 7.2.0.1, 7.2.1, 7.2.2, 7.2.3, 7.3.0, 7.3.1, 7.3.1.1'}
CVE-2023-20972
In btm_vendor_specific_evt of btm_devctl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-255304665
https://source.android.com/security/bulletin/pixel/2023-06-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-13'}
CVE-2023-20837
In seninf, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07992786; Issue ID: ALPS07992786.
https://corp.mediatek.com/product-security-bulletin/September-2023
2022-10-28T02:03:23.687Z
2023-09-04T02:27:43.828Z
2023-09-04T02:27:43.828Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6885, MT6893, MT8185, MT8385, MT8781, MT8788, MT8789, MT8797', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20564
Insufficient validation in the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may permit a privileged attacker to perform memory reads/writes potentially leading to a loss of confidentiality or arbitrary kernel execution.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7004
2022-10-27T18:53:39.747Z
2023-08-15T21:07:49.838Z
2023-08-15T21:07:49.838Z
{'Vendor': 'AMD', 'Product': 'Ryzen™ Master', 'Versions': ' '}
CVE-2023-20134
Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or upload arbitrary files as recordings. For more information about these vulnerabilities, see the Details section of this advisory.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wbx-sxss-fupl-64uHbcm5
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Webex Meetings ', 'Versions': 'n/a'}
CVE-2023-20925
In setUclampMinLocked of PowerSessionManager.cpp, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-236674672References: N/A
https://source.android.com/security/bulletin/pixel/2023-01-01
2022-11-03T00:00:00
2023-01-24T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-20026
A vulnerability in the web-based management interface of Cisco Small Business Routers RV042 Series could allow an authenticated, remote attacker to inject arbitrary commands on an affected device. This vulnerability is due to improper validation of user input fields within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5
2022-10-27T18:47:50.309Z
2023-01-19T01:33:26.928Z
2024-01-25T16:57:33.906Z
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business RV Series Router Firmware', 'Versions': '1.0.00.29, 1.0.00.33, 1.0.01.16, 1.0.01.17, 1.0.01.18, 1.0.01.20, 1.0.02.16, 1.0.03.15, 1.0.03.16, 1.0.03.17, 1.0.03.18, 1.0.03.19, 1.0.03.20, 1.0.03.21, 1.0.03.22, 1.0.03.24, 1.0.03.26, 1.0.03.27, 1.0.03.28, 1.0.03.29, 2.0.0.19-tm, 2.0.2.01-tm, 1.3.12.19-tm, 1.3.12.6-tm, 1.3.13.02-tm, 1.3.9.8-tm, 4.0.0.7, 4.0.2.08-tm, 4.0.3.03-tm, 4.0.4.02-tm, 4.2.1.02, 4.2.2.08, 4.2.3.03, 4.2.3.06, 4.2.3.07, 4.2.3.08, 4.2.3.09, 4.2.3.10, 4.2.3.14, 3.0.0.1-tm, 3.0.0.19-tm, 3.0.2.01-tm, 4.1.1.01, 4.1.0.02-tm'}
CVE-2023-20163
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid credentials on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-sRQnsEU9
2022-10-27T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Identity Services Engine Software ', 'Versions': 'n/a'}
CVE-2023-20533
Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002
2022-10-27T18:53:39.739Z
2023-11-14T18:52:52.106Z
2023-11-14T18:52:52.106Z
{'Vendor': 'AMD', 'Product': 'Ryzen™ 3000 series Desktop Processors “Matisse"', 'Versions': 'various '}
CVE-2023-20860
Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.
https://spring.io/security/cve-2023-20860
2022-11-01T00:00:00
2023-03-27T00:00:00
2023-05-05T00:00:00
{'Vendor': 'n/a', 'Product': 'Spring Framework', 'Versions': 'Spring Framework (versions 6.0.0 to 6.0.6 and 5.3.0 to 5.3.25)'}
CVE-2023-20749
In swpm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780926.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.770Z
2023-06-06T12:11:47.207Z
2023-06-06T12:11:47.207Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6789, MT6835, MT6855, MT6879, MT6886, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8175, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8791T, MT8797', 'Versions': 'Android 13.0'}
CVE-2023-20030
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access sensitive information, conduct a server-side request forgery (SSRF) attack through an affected device, or negatively impact the responsiveness of the web-based management interface itself. This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by uploading a crafted XML file that contains references to external entities. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of confidential information. A successful exploit could also cause the web application to perform arbitrary HTTP requests on behalf of the attacker or consume memory resources to reduce the availability of the web-based management interface. To successfully exploit this vulnerability, an attacker would need valid Super Admin or Policy Admin credentials.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-GecEHY58
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Identity Services Engine Software ', 'Versions': 'n/a'}
CVE-2023-20899
VMware SD-WAN (Edge) contains a bypass authentication vulnerability. An unauthenticated attacker can download the Diagnostic bundle of the application under VMware SD-WAN Management.
https://www.vmware.com/security/advisories/VMSA-2023-0015.html
2022-11-01T15:41:50.396Z
2023-07-06T22:29:19.852Z
2023-07-06T22:29:28.115Z
{'Vendor': 'n/a', 'Product': 'VMware SD-WAN (Edge)', 'Versions': 'VMware SD-WAN (Edge) 4.5.x, VMware SD-WAN (Edge) 5.x'}
CVE-2023-20933
In several functions of MediaCodec.cpp, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-245860753
https://source.android.com/security/bulletin/2023-02-01
2022-11-03T00:00:00
2023-02-28T00:00:00
2023-02-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-10 Android-11 Android-12 Android-12L Android-13'}
CVE-2023-20525
Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032
2022-10-27T18:53:39.737Z
2023-01-10T20:57:00.713Z
2023-01-11T07:01:59.843980Z
{'Vendor': ' AMD', 'Product': '2nd Gen EPYC', 'Versions': 'various '}
CVE-2023-20175
A vulnerability in a specific Cisco ISE CLI command could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, an attacker must have valid Read-only-level privileges or higher on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw
2022-10-27T18:47:50.363Z
2023-11-01T17:13:18.726Z
2024-01-25T16:57:49.673Z
{'Vendor': 'Cisco', 'Product': 'Cisco Identity Services Engine Software', 'Versions': '2.6.0, 2.6.0 p1, 2.6.0 p2, 2.6.0 p3, 2.6.0 p5, 2.6.0 p6, 2.6.0 p7, 2.6.0 p8, 2.6.0 p9, 2.6.0 p10, 2.6.0 p11, 2.6.0 p12, 2.7.0, 2.7.0 p1, 2.7.0 p2, 2.7.0 p3, 2.7.0 p4, 2.7.0 p5, 2.7.0 p6, 2.7.0 p7, 2.7.0 p9, 3.0.0, 3.0.0 p1, 3.0.0 p2, 3.0.0 p3, 3.0.0 p4, 3.0.0 p5, 3.0.0 p6, 3.0.0 p7, 3.1.0, 3.1.0 p1, 3.1.0 p3, 3.1.0 p4, 3.1.0 p5, 3.2.0'}
CVE-2023-20964
In multiple functions of MediaSessionRecord.java, there is a possible Intent rebroadcast due to a confused deputy. This could lead to local denial of service or escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-238177121
https://source.android.com/security/bulletin/2023-03-01
2022-11-03T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-12 Android-12L Android-13'}
CVE-2023-20067
A vulnerability in the HTTP-based client profiling feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of received traffic. An attacker could exploit this vulnerability by sending crafted traffic through a wireless access point. A successful exploit could allow the attacker to cause CPU utilization to increase, which could result in a DoS condition on an affected device and could cause new wireless client associations to fail. Once the offending traffic stops, the affected system will return to an operational state and new client associations will succeed.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-dos-wFujBHKw
2022-10-27T00:00:00
2023-03-23T00:00:00
2023-03-23T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco IOS XE Software ', 'Versions': 'n/a'}
CVE-2023-20122
Multiple vulnerabilities in the restricted shell of Cisco Evolved Programmable Network Manager (EPNM), Cisco Identity Services Engine (ISE), and Cisco Prime Infrastructure could allow an authenticated, local attacker to escape the restricted shell and gain root privileges on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-adeos-MLAyEcvk
2022-10-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Identity Services Engine Software ', 'Versions': 'n/a'}
CVE-2023-20088
A vulnerability in the nginx configurations that are provided as part of the VPN-less reverse proxy for Cisco Finesse could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition for new and existing users who are connected through a load balancer. This vulnerability is due to improper IP address filtering by the reverse proxy. An attacker could exploit this vulnerability by sending a series of unauthenticated requests to the reverse proxy. A successful exploit could allow the attacker to cause all current traffic and subsequent requests to the reverse proxy through a load balancer to be dropped, resulting in a DoS condition.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-finesse-proxy-dos-vY5dQhrV
2022-10-27T00:00:00
2023-03-03T00:00:00
2023-03-03T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Unified Contact Center Enterprise ', 'Versions': 'n/a'}
CVE-2023-20821
In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937113; Issue ID: ALPS07937113.
https://corp.mediatek.com/product-security-bulletin/September-2023
2022-10-28T02:03:23.673Z
2023-09-04T02:27:17.577Z
2023-09-04T02:27:17.577Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT2713, MT2735, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797', 'Versions': 'Android 11.0, 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3'}
CVE-2023-20620
In adsp, there is a possible escalation of privilege due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07554558; Issue ID: ALPS07554558.
https://corp.mediatek.com/product-security-bulletin/March-2023
2022-10-28T00:00:00
2023-03-07T00:00:00
2023-05-09T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6879, MT6895, MT6983', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20270
A vulnerability in the interaction between the Server Message Block (SMB) protocol preprocessor and the Snort 3 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error-checking when the Snort 3 detection engine is processing SMB traffic. An attacker could exploit this vulnerability by sending a crafted SMB packet stream through an affected device. A successful exploit could allow the attacker to cause the Snort process to reload, resulting in a DoS condition.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-smbsnort3-dos-pfOjOYUV
2022-10-27T18:47:50.373Z
2023-11-01T16:51:13.156Z
2024-01-25T16:58:37.172Z
{'Vendor': 'Cisco', 'Product': 'Cisco Firepower Threat Defense Software', 'Versions': '7.1.0, 7.1.0.1, 7.1.0.2, 7.1.0.3, 7.2.0, 7.2.0.1, 7.2.1, 7.2.2, 7.2.3, 7.3.0, 7.3.1, 7.3.1.1'}
CVE-2023-20159
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
2022-10-27T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business Smart and Managed Switches ', 'Versions': 'n/a'}
CVE-2023-20698
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07589144; Issue ID: ALPS07589144.
https://corp.mediatek.com/product-security-bulletin/May-2023
2022-10-28T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797', 'Versions': 'Android 11.0, 12.0, 13.0'}
CVE-2023-20732
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573480; Issue ID: ALPS07573480.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.767Z
2023-06-06T12:11:15.218Z
2023-06-06T12:11:15.218Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT7663, MT7668, MT7902, MT7921, MT8167, MT8167S, MT8173, MT8175, MT8195, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8666, MT8695, MT8781, MT8788', 'Versions': 'Android 12.0, 13.0 / Yocto 3.1,3.3,4.0'}
CVE-2023-20227
A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain L2TP packets. An attacker could exploit this vulnerability by sending crafted L2TP packets to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. Note: Only traffic directed to the affected system can be used to exploit this vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-l2tp-dos-eB5tuFmV
2022-10-27T18:47:50.369Z
2023-09-27T17:21:38.623Z
2024-01-25T16:58:25.292Z
{'Vendor': 'Cisco', 'Product': 'Cisco IOS XE Software', 'Versions': '16.8.1, 16.8.1a, 16.8.1b, 16.8.1s, 16.8.1c, 16.8.1d, 16.8.2, 16.8.1e, 16.8.3, 16.9.1, 16.9.2, 16.9.1a, 16.9.1b, 16.9.1s, 16.9.3, 16.9.4, 16.9.5, 16.9.5f, 16.9.6, 16.9.7, 16.9.8, 16.10.1, 16.10.1a, 16.10.1b, 16.10.1s, 16.10.1c, 16.10.1e, 16.10.1d, 16.10.2, 16.10.1f, 16.10.1g, 16.10.3, 16.11.1, 16.11.1a, 16.11.1b, 16.11.2, 16.11.1s, 16.12.1, 16.12.1s, 16.12.1a, 16.12.1c, 16.12.1w, 16.12.2, 16.12.1y, 16.12.2a, 16.12.3, 16.12.8, 16.12.2s, 16.12.1x, 16.12.1t, 16.12.4, 16.12.3s, 16.12.4a, 16.12.5, 16.12.6, 16.12.1z1, 16.12.5a, 16.12.1z2, 16.12.6a, 16.12.7, 16.12.10a, 17.1.1, 17.1.1a, 17.1.1s, 17.1.1t, 17.1.3, 17.2.1, 17.2.1r, 17.2.1a, 17.2.1v, 17.2.2, 17.2.3, 17.3.1, 17.3.2, 17.3.3, 17.3.1a, 17.3.1w, 17.3.2a, 17.3.1x, 17.3.1z, 17.3.4, 17.3.5, 17.3.4a, 17.3.6, 17.3.4c, 17.3.5a, 17.3.5b, 17.3.7, 17.4.1, 17.4.2, 17.4.1a, 17.4.1b, 17.4.2a, 17.5.1, 17.5.1a, 17.5.1b, 17.5.1c'}
CVE-2023-20677
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588436.
https://corp.mediatek.com/product-security-bulletin/April-2023
2022-10-28T00:00:00
2023-04-06T00:00:00
2023-04-06T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT5221, MT6781, MT6789, MT6833, MT6855, MT6877, MT6879, MT6895, MT6983, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8168, MT8169, MT8175, MT8185, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8675, MT8695, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798', 'Versions': 'Android 11.0, 12.0, 13.0 / Yocto 3.1, 3.3, 4.0 / Linux-4.19 (for MT5221, MT7663, MT7668, MT7902 and MT7921 chipsets only)'}
CVE-2023-20948
In dropFramesUntilIframe of AAVCAssembler.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-230630526
https://source.android.com/security/bulletin/2023-02-01
2022-11-03T00:00:00
2023-02-28T00:00:00
2023-02-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-12 Android-12L Android-13'}
CVE-2023-20724
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07843845; Issue ID: ALPS07843841.
https://corp.mediatek.com/product-security-bulletin/June-2023
2022-10-28T02:03:10.766Z
2023-06-06T12:12:03.117Z
2023-06-06T12:12:03.117Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT8167, MT8175, MT8183', 'Versions': 'Android 11.0, 12.0, 13.0'}
CVE-2023-20661
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560782; Issue ID: ALPS07560782.
https://corp.mediatek.com/product-security-bulletin/April-2023
2022-10-28T00:00:00
2023-04-06T00:00:00
2023-04-06T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT5221, MT6879, MT6895, MT6983, MT7902, MT7921, MT8167S, MT8168, MT8175, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8696, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8797, MT8798', 'Versions': 'Android 12.0, 13.0 / Yocto 3.1, 3.3, 4.0 / Linux-4.19 (for MT5221, MT7921 and MT7902 chipsets only)'}
CVE-2023-20231
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges. Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdij-FzZAeXAy
2022-10-27T18:47:50.369Z
2023-09-27T17:19:17.664Z
2024-01-25T16:58:26.549Z
{'Vendor': 'Cisco', 'Product': 'Cisco IOS XE Software', 'Versions': '16.12.8, 16.12.4, 16.12.4a, 16.12.5, 16.12.6, 16.12.5a, 16.12.5b, 16.12.6a, 16.12.7, 16.12.9, 17.2.2, 17.2.3, 17.3.1, 17.3.2, 17.3.3, 17.3.1a, 17.3.1w, 17.3.2a, 17.3.1x, 17.3.1z, 17.3.4, 17.3.5, 17.3.4a, 17.3.6, 17.3.4b, 17.3.4c, 17.3.5a, 17.3.5b, 17.4.1, 17.4.2, 17.4.1a, 17.4.1b, 17.4.2a, 17.5.1, 17.5.1a, 17.5.1b, 17.5.1c, 17.6.1, 17.6.2, 17.6.1w, 17.6.1a, 17.6.1x, 17.6.3, 17.6.1y, 17.6.1z, 17.6.3a, 17.6.4, 17.6.1z1, 17.6.5, 17.6.5a, 17.7.1, 17.7.1a, 17.7.1b, 17.7.2, 17.10.1, 17.10.1a, 17.10.1b, 17.8.1, 17.8.1a, 17.9.1, 17.9.1w, 17.9.2, 17.9.1a, 17.9.1x, 17.9.1y, 17.9.2a, 17.9.1x1'}
CVE-2023-20118
A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. Cisco has not and will not release software updates that address this vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5
2022-10-27T18:47:50.345Z
2023-04-05T16:05:41.067Z
2024-01-25T16:57:46.788Z
{'Vendor': 'Cisco', 'Product': 'Cisco Small Business RV Series Router Firmware', 'Versions': '1.0.1.17, 1.0.2.03, 1.1.0.09, 1.1.1.19, 1.1.1.06, 1.2.1.13, 1.2.1.14, 1.3.1.12, 1.3.2.02, 1.3.1.10, 1.4.2.15, 1.4.2.17, 1.4.2.19, 1.4.2.20, 1.4.2.22, 1.5.1.05, 1.5.1.11, 1.5.1.13'}
CVE-2023-20773
In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07611449; Issue ID: ALPS07441735.
https://corp.mediatek.com/product-security-bulletin/July-2023
2022-10-28T02:03:10.774Z
2023-07-04T01:44:38.761Z
2023-07-04T01:44:38.761Z
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8781, MT8791, MT8791T, MT8797', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20266
A vulnerability in Cisco Emergency Responder, Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability exists because the application does not properly restrict the files that are being used for upgrades. An attacker could exploit this vulnerability by providing a crafted upgrade file. A successful exploit could allow the attacker to elevate privileges to root. To exploit this vulnerability, the attacker must have valid platform administrator credentials on an affected device.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-priv-esc-D8Bky5eg
2022-10-27T18:47:50.373Z
2023-08-30T16:18:42.528Z
2024-01-25T16:58:35.907Z
{'Vendor': 'Cisco', 'Product': 'Cisco Emergency Responder', 'Versions': '12.5(1)SU4, 12.5(1)SU8a, 14SU3'}
CVE-2023-20636
In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292593; Issue ID: ALPS07292593.
https://corp.mediatek.com/product-security-bulletin/March-2023
2022-10-28T00:00:00
2023-03-07T00:00:00
2023-05-09T00:00:00
{'Vendor': 'MediaTek, Inc.', 'Product': 'MT6895, MT6985, MT8168, MT8781', 'Versions': 'Android 12.0, 13.0'}
CVE-2023-20909
In multiple functions of RunningTasks.java, there is a possible privilege escalation due to a missing privilege check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-243130512
https://source.android.com/security/bulletin/2023-04-01
2022-11-03T00:00:00
2023-04-19T00:00:00
2023-04-19T00:00:00
{'Vendor': 'n/a', 'Product': 'Android', 'Versions': 'Android-11 Android-12 Android-12L Android-13'}