Auto-Update: 2025-03-16T17:00:19.513724+00:00

This commit is contained in:
cad-safe-bot 2025-03-16 17:03:49 +00:00
parent f9e21f6022
commit 871edb392a
5 changed files with 297 additions and 66 deletions

View File

@ -2,63 +2,15 @@
"id": "CVE-2024-11879",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-14T05:15:09.257",
"lastModified": "2024-12-14T05:15:09.257",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-16T15:15:36.407",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Stripe Donation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'stripe_donation' shortcode in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Stripe Donation para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'stripe_donation' del complemento en todas las versiones hasta la 1.2.5 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-53752. Reason: This candidate is a reservation duplicate of CVE-2024-53752. Notes: All CVE users should reference CVE-2024-53752 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/bin-stripe-donation/trunk/module/shortcode.php#L32",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3a028937-38bb-4c28-aaa1-60a86124c998?source=cve",
"source": "security@wordfence.com"
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-2341",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-16T15:15:36.523",
"lastModified": "2025-03-16T15:15:36.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in IROAD Dash Cam X5 up to 20250203. It has been rated as problematic. This issue affects some unknown processing of the component SSID. The manipulation leads to use of default credentials. The attack needs to be initiated within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "ADJACENT",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"baseScore": 1.8,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.2,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1392"
}
]
}
],
"references": [
{
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-1-default-credentials-for-ssid-cwe-1393",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299807",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299807",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.512418",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-2342",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-16T16:15:11.613",
"lastModified": "2025-03-16T16:15:11.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in IROAD X5 Mobile App up to 5.2.5 on Android. Affected is an unknown function of the component API Endpoint. The manipulation leads to hard-coded credentials. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-259"
},
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-2-hardcoded-credentials-in-apk-iroad--v525-to-ports-9091-and-9092",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299808",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299808",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.512419",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-16T15:00:20.111600+00:00
2025-03-16T17:00:19.513724+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-16T14:15:12.597000+00:00
2025-03-16T16:15:11.613000+00:00
```
### Last Data Feed Release
@ -33,23 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
285348
285350
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `2`
- [CVE-2025-2338](CVE-2025/CVE-2025-23xx/CVE-2025-2338.json) (`2025-03-16T13:15:37.827`)
- [CVE-2025-2339](CVE-2025/CVE-2025-23xx/CVE-2025-2339.json) (`2025-03-16T13:15:38.003`)
- [CVE-2025-2340](CVE-2025/CVE-2025-23xx/CVE-2025-2340.json) (`2025-03-16T14:15:12.597`)
- [CVE-2025-2341](CVE-2025/CVE-2025-23xx/CVE-2025-2341.json) (`2025-03-16T15:15:36.523`)
- [CVE-2025-2342](CVE-2025/CVE-2025-23xx/CVE-2025-2342.json) (`2025-03-16T16:15:11.613`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
- [CVE-2025-1211](CVE-2025/CVE-2025-12xx/CVE-2025-1211.json) (`2025-03-16T13:15:36.813`)
- [CVE-2024-11879](CVE-2024/CVE-2024-118xx/CVE-2024-11879.json) (`2025-03-16T15:15:36.407`)
## Download and Usage

View File

@ -246028,7 +246028,7 @@ CVE-2024-11875,0,0,2fce0016aa8c6a027c95eca97da341c6f52b04c99e151a803448f2d92e035
CVE-2024-11876,0,0,4d446e019fc456b762b8b387c5e79806d641107f5a6d66eca5284969e986ead6,2024-12-14T05:15:08.890000
CVE-2024-11877,0,0,ea4b234684fec63e3511addc951d161596023eb0b3e6bfea2e1878541e65dfd7,2024-12-14T05:15:09.060000
CVE-2024-11878,0,0,2e699d96d7e78c506aa9282249a36163ab9a3efeb4dbea09b924dcc97dfb0028,2024-12-20T07:15:11.577000
CVE-2024-11879,0,0,e8a515ed6edcfb0fb930c574d70c2bafbc06cc79607e71cc394cea1a89ae91ed,2024-12-14T05:15:09.257000
CVE-2024-11879,0,1,bfc93ecdd227bdaa407f87843c48a410b29b48902694ce48754cc8caa0e47759,2025-03-16T15:15:36.407000
CVE-2024-1188,0,0,a65e9144328c7bf88ed9510065b2567c80bec907fa15019254b44a904bcf4c98,2024-11-21T08:49:59.690000
CVE-2024-11880,0,0,bc08b419001e69ecc8df6960919cacc77cc712a48473883e8526af3cf15bbb8b,2024-12-04T09:15:04.470000
CVE-2024-11881,0,0,8fa46a17561a3f64d47980cb006235813b4640fc22e06e929d7ed0d5e4fb648d,2024-12-18T03:15:26.103000
@ -281074,7 +281074,7 @@ CVE-2025-1207,0,0,2e207fe82a46faaf11a8c21d08133b4c3fe900fb7cb6fb92673f2816d05d2e
CVE-2025-1208,0,0,7d439f27be25af068ee7a5bdbb340ddd01d136ca5376da5fb603abe97482c28a,2025-02-21T12:03:49.027000
CVE-2025-1209,0,0,73163c928794f026d7174c939dfacce9c8a62bab67c5de9237fcf3ce185d0ff4,2025-02-19T19:04:43.770000
CVE-2025-1210,0,0,51f4cbb43c759e53b163b7aede54aac4df773ce5b490d7dce07597fb52fb1a4c,2025-02-19T19:03:10.870000
CVE-2025-1211,0,1,ed333afb6325a084c131f00ee087aa14b3435cac8d955152c6875f0fc0fc0275,2025-03-16T13:15:36.813000
CVE-2025-1211,0,0,ed333afb6325a084c131f00ee087aa14b3435cac8d955152c6875f0fc0fc0275,2025-03-16T13:15:36.813000
CVE-2025-1212,0,0,4775d3c7abc8db0222566d77a07a3b283456acd669d779aebc898ec54ad5eb25,2025-02-12T15:15:18.290000
CVE-2025-1213,0,0,226c2da2d3a4aac647d77e7a97567bbe3f4fafbe21e513e404ff5a1441bfa553,2025-02-12T18:15:22.180000
CVE-2025-1214,0,0,ee530a0ccb2dbec34bd0adb6326677fa3eb44dee2c85c32f60f080d2175851ef,2025-02-12T20:15:39.200000
@ -283112,15 +283112,15 @@ CVE-2025-23368,0,0,9c664fc0f9e7b340d6131cc859aefb9e94f28c0c73f7486f5208547e13f40
CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000
CVE-2025-2337,0,0,1bea57575dcbf4d8c20ecfdcc326ac9e1955617776c3e47359ed64a009bcb1d4,2025-03-16T10:15:25.793000
CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000
CVE-2025-2338,1,1,e1817d3bd4f3a2886eb379672293e26d61da3216de9706af1fbe1866b37f5783,2025-03-16T13:15:37.827000
CVE-2025-2338,0,0,e1817d3bd4f3a2886eb379672293e26d61da3216de9706af1fbe1866b37f5783,2025-03-16T13:15:37.827000
CVE-2025-23384,0,0,d7685224b7a10743fe5eae6a1ebefcafcac773ad88bd00cac8b6407ed3adf454,2025-03-11T10:15:16.330000
CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000
CVE-2025-2339,1,1,afa9f41c145fa401320379508d9b5b5e05539d020c2ea1635094e22e6dc0961a,2025-03-16T13:15:38.003000
CVE-2025-2339,0,0,afa9f41c145fa401320379508d9b5b5e05539d020c2ea1635094e22e6dc0961a,2025-03-16T13:15:38.003000
CVE-2025-23396,0,0,db4e35f65814d6895af1ea2102cd85328d5b692a5d5376b0f0f76fda3c3d1fa0,2025-03-11T10:15:16.670000
CVE-2025-23397,0,0,b39331b70d2d90745cf1ffdc79eae13a67bdd2a5914d5254d36092c6bef82b6d,2025-03-11T10:15:16.840000
CVE-2025-23398,0,0,06f6f7336d9ea782ecf8b7d22ce4427b70f63b9b90fe1843698322a5007cf4ed,2025-03-11T10:15:17.003000
CVE-2025-23399,0,0,e66db143849977e632a1a124fcc414710388ef65cb62a1f55b4d71ff26436fb5,2025-03-11T10:15:17.170000
CVE-2025-2340,1,1,2eb6ec780dd415eb7cddbda300af4f454e7143aea12afe3b447bfc929780d78e,2025-03-16T14:15:12.597000
CVE-2025-2340,0,0,2eb6ec780dd415eb7cddbda300af4f454e7143aea12afe3b447bfc929780d78e,2025-03-16T14:15:12.597000
CVE-2025-23400,0,0,b755ab97b14d8b740d82a6612ee133fbf20401fdc1734461b26bfa7a91c6fcd6,2025-03-11T10:15:17.340000
CVE-2025-23401,0,0,eb1c714c7e9d831c089f5fed48a6c73e9e71df48f5421115f3033bd2a0193a80,2025-03-11T10:15:17.510000
CVE-2025-23402,0,0,076d51d523d07583e5d9307add68f7b55e0d82f2216daeb4d8d036f63f4d832b,2025-03-11T10:15:17.680000
@ -283128,6 +283128,7 @@ CVE-2025-23403,0,0,644047de2ce1ffb265b5a42cecfc2f854cd0e7552ab44d86c93242e1e0442
CVE-2025-23405,0,0,ddeb2b5db57c9fcee267274617b0df7ed66e371a7704cf175d824eede48f6b9a,2025-02-28T17:15:16.637000
CVE-2025-23406,0,0,38d5c87f4e786637cbc4fcb4a2f7006ad80927b3c7219b037e30cf1414c39e8c,2025-02-14T05:15:12.567000
CVE-2025-23409,0,0,1a3520493aa68f1dcbe322db4ee95d2acadad9f2e524f892c3f32c34d0db5297,2025-03-04T17:40:38.997000
CVE-2025-2341,1,1,4afb60d3c86721212d82b469e9afe1e6ae512771a67149ff5180d32538982cb6,2025-03-16T15:15:36.523000
CVE-2025-23410,0,0,3a80115160ef99d7b702d3a18a15cf574791aa7a10fe93b7ce15f60d58877b71,2025-03-05T00:15:38.250000
CVE-2025-23411,0,0,aac0c0506ff92f62f0126c5480be46ecee57401908d90757a18ef61467b10cfe,2025-03-04T21:18:50.307000
CVE-2025-23412,0,0,879dc1f233cd1ed0927b887a0c257bb01d6c254311c7a39c5817d5ae0b0fbc54,2025-02-05T18:15:31.580000
@ -283137,6 +283138,7 @@ CVE-2025-23415,0,0,c2dd48094efc8e1bfacac6004cbfdb2acecbbfdd3e26439f960c8800a711b
CVE-2025-23416,0,0,738b40e2665859ff1149c71c3890c183cdfa2a48dcf76c7c1a8fabc9acef88ff,2025-03-05T16:15:38.530000
CVE-2025-23418,0,0,eaa977c3712de827637fe8b26b1c9584964237077e6aebddc00a01c8a84de575,2025-03-04T17:14:49.393000
CVE-2025-23419,0,0,dcd7b3325727301465e5372f86361f511c377c0aa3f87515df8f22306063b58f,2025-02-05T20:15:45.717000
CVE-2025-2342,1,1,452e7a05658627ee4e1370c4bd6e5430d11a60055a6f4be8f3384f0c19900b9d,2025-03-16T16:15:11.613000
CVE-2025-23420,0,0,ea19881d25ade64b6c8429d514b5edebdd89c09d7db1271e5f57f9dea48d9a7f,2025-03-04T17:15:27.643000
CVE-2025-23421,0,0,e43dea6eba9dd389189f164d376c83ee3800e2f7fb6bbdb2086d590d848a63d6,2025-02-13T22:15:12.073000
CVE-2025-23422,0,0,02fa1caf24a4eabe3a7a82363ae4ebce4a671b3054c1ebfa03694d43e05e5f21,2025-01-24T11:15:09.987000

Can't render this file because it is too large.