Auto-Update: 2024-03-12T03:00:31.743604+00:00

This commit is contained in:
cad-safe-bot 2024-03-12 03:03:19 +00:00
parent a70656f48c
commit 266568b1d0
9 changed files with 434 additions and 9 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-22127",
"sourceIdentifier": "cna@sap.com",
"published": "2024-03-12T01:15:49.060",
"lastModified": "2024-03-12T01:15:49.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver Administrator AS Java (Administrator Log Viewer plug-in) - version 7.50, allows an attacker with high privileges to upload potentially dangerous files\u00a0which leads to command injection vulnerability. This would enable the attacker to run commands which can cause high impact on confidentiality, integrity and availability of the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3433192",
"source": "cna@sap.com"
},
{
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-22133",
"sourceIdentifier": "cna@sap.com",
"published": "2024-03-12T01:15:49.293",
"lastModified": "2024-03-12T01:15:49.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SAP Fiori Front End Server - version 605, allows altering of approver details on the read-only field when sending leave request information. This could lead to creation of request with incorrect approver causing low impact on Confidentiality and Integrity with no impact on\u00a0Availability of the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3417399",
"source": "cna@sap.com"
},
{
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-25644",
"sourceIdentifier": "cna@sap.com",
"published": "2024-03-12T01:15:49.567",
"lastModified": "2024-03-12T01:15:49.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Under certain conditions SAP NetWeaver\u00a0WSRM\u00a0- version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3425682",
"source": "cna@sap.com"
},
{
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-25645",
"sourceIdentifier": "cna@sap.com",
"published": "2024-03-12T01:15:49.780",
"lastModified": "2024-03-12T01:15:49.780",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Under certain condition\u00a0SAP\u00a0NetWeaver (Enterprise Portal) - version 7.50\u00a0allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3428847",
"source": "cna@sap.com"
},
{
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-27900",
"sourceIdentifier": "cna@sap.com",
"published": "2024-03-12T01:15:49.980",
"lastModified": "2024-03-12T01:15:49.980",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Due to missing authorization check, attacker with business user account in SAP ABAP Platform - version 758, 795, can change the privacy setting of job templates from shared to private. As a result, the selected template would only be accessible to the owner.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3419022",
"source": "cna@sap.com"
},
{
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-27902",
"sourceIdentifier": "cna@sap.com",
"published": "2024-03-12T01:15:50.193",
"lastModified": "2024-03-12T01:15:50.193",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Applications based on SAP GUI for HTML in SAP NetWeaver AS ABAP - versions 7.89, 7.93, do not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.\u00a0A successful attack can allow a malicious attacker to access and modify data through their ability to execute code in a user\u2019s browser. There is no impact on the availability of the system\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3377979",
"source": "cna@sap.com"
},
{
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-28163",
"sourceIdentifier": "cna@sap.com",
"published": "2024-03-12T01:15:50.390",
"lastModified": "2024-03-12T01:15:50.390",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration\u00a0(PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3434192",
"source": "cna@sap.com"
},
{
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
"source": "cna@sap.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-12T00:55:31.278967+00:00
2024-03-12T03:00:31.743604+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-12T00:15:26.383000+00:00
2024-03-12T01:15:50.390000+00:00
```
### Last Data Feed Release
@ -23,21 +23,26 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-03-11T01:00:20.244629+00:00
2024-03-12T01:00:20.250337+00:00
```
### Total Number of included CVEs
```plain
241067
241074
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `7`
* [CVE-2023-49785](CVE-2023/CVE-2023-497xx/CVE-2023-49785.json) (`2024-03-12T00:15:26.383`)
* [CVE-2024-28199](CVE-2024/CVE-2024-281xx/CVE-2024-28199.json) (`2024-03-11T23:15:47.333`)
* [CVE-2024-22127](CVE-2024/CVE-2024-221xx/CVE-2024-22127.json) (`2024-03-12T01:15:49.060`)
* [CVE-2024-22133](CVE-2024/CVE-2024-221xx/CVE-2024-22133.json) (`2024-03-12T01:15:49.293`)
* [CVE-2024-25644](CVE-2024/CVE-2024-256xx/CVE-2024-25644.json) (`2024-03-12T01:15:49.567`)
* [CVE-2024-25645](CVE-2024/CVE-2024-256xx/CVE-2024-25645.json) (`2024-03-12T01:15:49.780`)
* [CVE-2024-27900](CVE-2024/CVE-2024-279xx/CVE-2024-27900.json) (`2024-03-12T01:15:49.980`)
* [CVE-2024-27902](CVE-2024/CVE-2024-279xx/CVE-2024-27902.json) (`2024-03-12T01:15:50.193`)
* [CVE-2024-28163](CVE-2024/CVE-2024-281xx/CVE-2024-28163.json) (`2024-03-12T01:15:50.390`)
### CVEs modified in the last Commit

View File

@ -234441,7 +234441,7 @@ CVE-2023-49779,0,0,d369cdfbc3bf56a03ea959dc573bcc4f04f2dcce947797eaedce433cb11d4
CVE-2023-4978,0,0,e1da00e8851a82cb3dddca5e097cec8ce26d83de005e828893848ec9fe1f9871,2023-09-20T13:12:24.480000
CVE-2023-49782,0,0,76dff6e72827ea16b18b4fccddb0eda93f2c18601fd06d9018796d708edd15fd,2023-12-13T18:05:03.240000
CVE-2023-49783,0,0,6f16d1d768feb18e360904dc76b5c2ab173cb90b14bc06f6becf8953a196f38a,2024-02-02T05:07:08.153000
CVE-2023-49785,1,1,b36db5e367bea759355dbeb508b0fa069353157b92ef626a32bea1361582a4a3,2024-03-12T00:15:26.383000
CVE-2023-49785,0,0,b36db5e367bea759355dbeb508b0fa069353157b92ef626a32bea1361582a4a3,2024-03-12T00:15:26.383000
CVE-2023-49786,0,0,2d1b72213706d72224982a495bff5fdec7a8c59072d467de9fe743b7222280ff,2023-12-29T00:15:50.043000
CVE-2023-49787,0,0,685ad70bdefba8e6fd26a208af1cc6645856b2d35b81de7c098834b32522e28d,2023-12-07T18:15:08.447000
CVE-2023-49788,0,0,28bcb055e6aeb679bce67192439355faa6e9a57081d44ebf8f3390c9212896e4,2023-12-13T18:11:14.110000
@ -239320,11 +239320,13 @@ CVE-2024-22119,0,0,d25acc4f5f2224943f2feaeb837e6d77f51fb63d8c6b5945b3415b9f2d10b
CVE-2024-22124,0,0,35999c882bc6d44ddc45a9b1e3e882ba4227533058bc07c120048ab393e82eb5,2024-01-22T19:17:13.050000
CVE-2024-22125,0,0,09efd17c32a694e6a723ff7a2a9eaeeb4bc062e9a25db0f7cad8d3d4b4874464,2024-01-12T19:42:36.637000
CVE-2024-22126,0,0,21fbc349f898f1250de5f7f39ca68cc7afccec8ff42d81c72dbf786571fc9040,2024-02-13T14:01:40.577000
CVE-2024-22127,1,1,b8a1cfad23a1fc2e1e2b86bb0c6c6808495e6a2c75605d3a3146b69acd166360,2024-03-12T01:15:49.060000
CVE-2024-22128,0,0,0c5c439d18342819d7315b4a32a2bc4f41f858a1b21ef0fe06f84b34bb1db3d7,2024-02-13T14:01:40.577000
CVE-2024-22129,0,0,1464fd5d3308b792309b3cf96e4bac49b075b6a9da557a03d691691205ee62e4,2024-02-13T14:01:40.577000
CVE-2024-22130,0,0,ffff0cd5d2c7e1f26e5d22605c42aef119a3c1241fbbfb15485c0a6afd37c199,2024-02-13T14:01:40.577000
CVE-2024-22131,0,0,9eecd7b9a60271346c23c546cd86562dda5496cea369ce333688ec53c9899639,2024-02-13T14:01:40.577000
CVE-2024-22132,0,0,189c6c67b188cde4f4668ee97447e9e45ee679904d7ce8e743444e6ffa1377ac,2024-02-13T14:01:40.577000
CVE-2024-22133,1,1,d395c79d33c64622696800ab2c50648a85f5ada671e5aa003b0a4d9c6d286678,2024-03-12T01:15:49.293000
CVE-2024-22134,0,0,3be6b7702224117203e25cf98307e352d45c22327a969b8a5d10317e76a95679,2024-01-30T17:07:24.310000
CVE-2024-22135,0,0,7025eeb4417e68d70b1ebd56dbf2904b38773b2370d9f15dd4e72daa19dcfb0c,2024-01-30T17:34:58.917000
CVE-2024-22136,0,0,ffae1822b85f323446ecd7154230713998c5b43341d8cf75c26e20b18cf0dd08,2024-02-05T22:08:24.077000
@ -240617,6 +240619,8 @@ CVE-2024-25636,0,0,25ca08d2d7942010a89cee168f33ec13089ab5d688be0f620a303dd1bdaf7
CVE-2024-25640,0,0,e7a5a66e06481c463ef3267e2ad9b6391b00223315aeb71281eb8d63b041ce79,2024-02-20T19:50:53.960000
CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c145,2024-02-13T14:01:40.577000
CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000
CVE-2024-25644,1,1,78d79784a352fb21edf57e17afc353ddf416b192884d884b149b469d3f3c7a3e,2024-03-12T01:15:49.567000
CVE-2024-25645,1,1,f383e5e1d140d2087e3b734346e20fee8cc9cccbdb85fa7be0e803c798f628d1,2024-03-12T01:15:49.780000
CVE-2024-25674,0,0,880844ace2ad9fa6a214f1eff7f46e3beaded8f86ef202dfc09585e1e07ca21c,2024-02-12T14:30:40.343000
CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d233,2024-02-12T14:30:28.640000
CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000
@ -241005,6 +241009,8 @@ CVE-2024-27747,0,0,eda09f2b4b6af0e7dd609f89b3c49bd0b33e897e57a0119562f4261f2003f
CVE-2024-27764,0,0,a6da085213081f41482d74001d5b27250ddae1567bc465fa0f4b1023f8322f06,2024-03-06T15:18:08.093000
CVE-2024-27765,0,0,c9283b485df441e5cf44e98a2bcaa6921e6b7ae7825314dc1fd3bb862197fb6e,2024-03-06T15:18:08.093000
CVE-2024-27889,0,0,a24eb09c70fc8e243900497cf84a2002dc9fb9fdcf0cc7381ab2bee2e01200d8,2024-03-05T13:41:01.900000
CVE-2024-27900,1,1,3dbddeddcb80d3abc8bc72be714a2eaef381db51354a2393f9a881a8da10998f,2024-03-12T01:15:49.980000
CVE-2024-27902,1,1,9d3ceda02c4908a2828b39e1d8a426c64ed6f51ac94f3df5bee5307b4491f773,2024-03-12T01:15:50.193000
CVE-2024-27905,0,0,c7138ee734428b73e57ef70bc0c3a87d66350c09e2b81d6d3c89882bb51a7608,2024-02-28T14:07:00.563000
CVE-2024-27906,0,0,ae9bda7656d6e7e0689cf95cd57f8618d70aeb9672c7e9157dbd08c58d363490,2024-02-29T13:49:29.390000
CVE-2024-27913,0,0,4ab4f3916b8428dbf6a53f81f4240223329f17f5e9f63a6de1fd6dc690b5ff6a,2024-02-28T14:06:45.783000
@ -241042,6 +241048,7 @@ CVE-2024-28159,0,0,03ab5419913406dda33ba2555a6f6cb8daff27a74103bcc7559c9bf5674b1
CVE-2024-28160,0,0,56d3ee6a5af0d0e09e6c9aa1c04c5e7191044a0b97474702c1a3af2bea0d6256,2024-03-06T21:42:54.697000
CVE-2024-28161,0,0,a8b5439e973c7cdb8f91b0ae68db3c77b6c3c773d21694d3bca0cd7aa286762f,2024-03-06T21:42:54.697000
CVE-2024-28162,0,0,9f95dea899a301f3d7e776202ce6567032bc57cf37ea2c387cd5d210ccf05a4b,2024-03-06T21:42:54.697000
CVE-2024-28163,1,1,b003bc050b980d7fa8bde2e9f70a0b9b560b968882bfe1f27a1c997f149e486a,2024-03-12T01:15:50.390000
CVE-2024-28173,0,0,e0fed71b03fa1080cdfc47a71a0b80da5e87b19e624557c11c0e172f4b2c098a,2024-03-06T21:42:54.697000
CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d6b1,2024-03-06T21:42:54.697000
CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000
@ -241050,7 +241057,7 @@ CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241
CVE-2024-28187,0,0,6ad3874ba881443f641f39e3a3b8faab086575f93d3871aa198b7b52707f1e2f,2024-03-11T20:15:07.180000
CVE-2024-28197,0,0,81a6695e3f35180411e9e1480d63884dec3c7546044011915077e5a9022c6f52,2024-03-11T20:15:07.420000
CVE-2024-28198,0,0,b69b10822779767b360027621125c34db7967289e82c7e08b708ce0af64114c2,2024-03-11T20:15:07.643000
CVE-2024-28199,1,1,a3be8fb6ebc7387ff885519fed0f6735e2c51f4746826102d87b5337e44f280f,2024-03-11T23:15:47.333000
CVE-2024-28199,0,0,a3be8fb6ebc7387ff885519fed0f6735e2c51f4746826102d87b5337e44f280f,2024-03-11T23:15:47.333000
CVE-2024-28211,0,0,c1ed1ddd829861cccd703be6254c437e62099ef974f2a29a31d06b3aa407dda5,2024-03-07T13:52:27.110000
CVE-2024-28212,0,0,5a2751cb50b15d5c440d2b8966e76c727b56c2f7e1085394c9464fe62a449a7f,2024-03-07T13:52:27.110000
CVE-2024-28213,0,0,123dce2bcd1dc69568d6c5cbaff040ae81dbab0468f48456713cfbf9a03f5945,2024-03-07T13:52:27.110000

Can't render this file because it is too large.