mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 11:06:39 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3d7808db68
commit
d71d9dbf19
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-22282",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.elecom.co.jp/news/security/20230324-01/"
|
||||
"url": "https://www.elecom.co.jp/news/security/20230324-01/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.elecom.co.jp/news/security/20230324-01/"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN35246979/"
|
||||
"url": "https://jvn.jp/en/jp/JVN35246979/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN35246979/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-22429",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.wolt.android&hl=en_US&gl=US"
|
||||
"url": "https://play.google.com/store/apps/details?id=com.wolt.android&hl=en_US&gl=US",
|
||||
"refsource": "MISC",
|
||||
"name": "https://play.google.com/store/apps/details?id=com.wolt.android&hl=en_US&gl=US"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN64453490/"
|
||||
"url": "https://jvn.jp/en/jp/JVN64453490/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN64453490/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-23572",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.epson.jp/support/misc_t/230308_oshirase.htm"
|
||||
"url": "https://www.epson.jp/support/misc_t/230308_oshirase.htm",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.epson.jp/support/misc_t/230308_oshirase.htm"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN82424996/"
|
||||
"url": "https://jvn.jp/en/jp/JVN82424996/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN82424996/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-23575",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,19 +45,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
|
||||
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
|
||||
},
|
||||
{
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
|
||||
},
|
||||
{
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96198617/"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96198617/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU96198617/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-24464",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.buffalo.jp/news/detail/20230310-01.html"
|
||||
"url": "https://www.buffalo.jp/news/detail/20230310-01.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.buffalo.jp/news/detail/20230310-01.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96824262/"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96824262/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU96824262/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-24544",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.buffalo.jp/news/detail/20230310-01.html"
|
||||
"url": "https://www.buffalo.jp/news/detail/20230310-01.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.buffalo.jp/news/detail/20230310-01.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96824262/"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96824262/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU96824262/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-25755",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.electronics.jtekt.co.jp/en/topics/202303315311/"
|
||||
"url": "https://www.electronics.jtekt.co.jp/en/topics/202303315311/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.electronics.jtekt.co.jp/en/topics/202303315311/"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU99710864/"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU99710864/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU99710864/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-25950",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,13 +45,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.haproxy.org/"
|
||||
"url": "https://www.haproxy.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.haproxy.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://git.haproxy.org/?p=haproxy-2.7.git;a=commit;h=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46"
|
||||
"url": "https://git.haproxy.org/?p=haproxy-2.7.git;a=commit;h=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.haproxy.org/?p=haproxy-2.7.git;a=commit;h=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN38170084/"
|
||||
"url": "https://jvn.jp/en/jp/JVN38170084/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN38170084/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-25955",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://nlftp.mlit.go.jp/i_news.html#news4"
|
||||
"url": "https://nlftp.mlit.go.jp/i_news.html#news4",
|
||||
"refsource": "MISC",
|
||||
"name": "https://nlftp.mlit.go.jp/i_news.html#news4"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN75742861/"
|
||||
"url": "https://jvn.jp/en/jp/JVN75742861/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN75742861/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-26588",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.buffalo.jp/news/detail/20230310-01.html"
|
||||
"url": "https://www.buffalo.jp/news/detail/20230310-01.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.buffalo.jp/news/detail/20230310-01.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96824262/"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96824262/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU96824262/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-26593",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"
|
||||
"url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU98775218/"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU98775218/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU98775218/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-27389",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,19 +45,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
|
||||
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
|
||||
},
|
||||
{
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
|
||||
},
|
||||
{
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96198617/"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96198617/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU96198617/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-27520",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.epson.jp/support/misc_t/230308_oshirase.htm"
|
||||
"url": "https://www.epson.jp/support/misc_t/230308_oshirase.htm",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.epson.jp/support/misc_t/230308_oshirase.htm"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN82424996/"
|
||||
"url": "https://jvn.jp/en/jp/JVN82424996/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN82424996/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-27917",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,19 +45,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
|
||||
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
|
||||
},
|
||||
{
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
|
||||
},
|
||||
{
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
|
||||
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96198617/"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96198617/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU96198617/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-28368",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware"
|
||||
"url": "https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN62420378/"
|
||||
"url": "https://jvn.jp/en/jp/JVN62420378/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN62420378/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user