From a267018588c82c499d5f9d7feff26d5cddea8b61 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 26 Aug 2024 08:03:19 +0000 Subject: [PATCH] Auto-Update: 2024-08-26T08:00:22.317199+00:00 --- CVE-2024/CVE-2024-419xx/CVE-2024-41996.json | 29 +++++++++++++++++++++ CVE-2024/CVE-2024-436xx/CVE-2024-43688.json | 6 ++++- CVE-2024/CVE-2024-452xx/CVE-2024-45241.json | 29 +++++++++++++++++++++ CVE-2024/CVE-2024-452xx/CVE-2024-45256.json | 29 +++++++++++++++++++++ CVE-2024/CVE-2024-68xx/CVE-2024-6879.json | 21 +++++++++++++++ CVE-2024/CVE-2024-73xx/CVE-2024-7313.json | 21 +++++++++++++++ README.md | 21 ++++++++------- _state.csv | 17 +++++++----- 8 files changed, 156 insertions(+), 17 deletions(-) create mode 100644 CVE-2024/CVE-2024-419xx/CVE-2024-41996.json create mode 100644 CVE-2024/CVE-2024-452xx/CVE-2024-45241.json create mode 100644 CVE-2024/CVE-2024-452xx/CVE-2024-45256.json create mode 100644 CVE-2024/CVE-2024-68xx/CVE-2024-6879.json create mode 100644 CVE-2024/CVE-2024-73xx/CVE-2024-7313.json diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41996.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41996.json new file mode 100644 index 00000000000..aafe3713cb2 --- /dev/null +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41996.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-41996", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-26T06:15:04.603", + "lastModified": "2024-08-26T06:15:04.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://dheatattack.gitlab.io/details/", + "source": "cve@mitre.org" + }, + { + "url": "https://dheatattack.gitlab.io/faq/", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43688.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43688.json index fef487e0a59..6d48017feb6 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43688.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43688.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43688", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T06:15:04.983", - "lastModified": "2024-08-20T15:44:20.567", + "lastModified": "2024-08-26T06:15:04.767", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -21,6 +21,10 @@ "url": "https://github.com/vixie/cron/commit/9cc8ab1087bb9ab861dd5595c41200683c9f6712", "source": "cve@mitre.org" }, + { + "url": "https://www.supernetworks.org/CVE-2024-43688/openbsd-cron-heap-underflow.txt", + "source": "cve@mitre.org" + }, { "url": "https://www.supernetworks.org/advisories/CVE-2024-43688-openbsd-cron-heap-underflow.txt", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45241.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45241.json new file mode 100644 index 00000000000..dc675ed6d2c --- /dev/null +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45241.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45241", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-26T07:15:04.273", + "lastModified": "2024-08-26T07:15:04.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A traversal vulnerability in GeneralDocs.aspx in CentralSquare CryWolf (False Alarm Management) through 2024-08-09 allows unauthenticated attackers to read files outside of the working web directory via the rpt parameter, leading to the disclosure of sensitive information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://daly.wtf/cve-2024-45241-path-traversal-in-centralsquare-crywolf/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/d4lyw/CVE-2024-45241/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.centralsquare.com/solutions/public-safety-software/public-safety-agency-operations/crywolf-false-alarm-management-solution", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45256.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45256.json new file mode 100644 index 00000000000..273658af03c --- /dev/null +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45256.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45256", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-26T07:15:04.420", + "lastModified": "2024-08-26T07:15:04.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file write issue in the exfiltration endpoint in BYOB (Build Your Own Botnet) 2.0 allows attackers to overwrite SQLite databases and bypass authentication via an unauthenticated HTTP request with a crafted parameter. This occurs in file_add in api/files/routes.py." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.chebuya.com/posts/unauthenticated-remote-command-execution-on-byob/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/chebuya/exploits/tree/main/BYOB-RCE", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/malwaredllc/byob", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json new file mode 100644 index 00000000000..c34c6d003a6 --- /dev/null +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6879", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-26T06:15:04.867", + "lastModified": "2024-08-26T06:15:04.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Quiz and Survey Master (QSM) WordPress plugin before 9.1.1 fails to validate and escape certain Quiz fields before displaying them on a page or post where the Quiz is embedded, which could allows contributor and above roles to perform Stored Cross-Site Scripting (XSS) attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/4da0b318-03e7-409d-9b02-f108e4232c87/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7313.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7313.json new file mode 100644 index 00000000000..ab3b510f5eb --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7313.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-7313", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-26T06:15:04.947", + "lastModified": "2024-08-26T06:15:04.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Shield Security WordPress plugin before 20.0.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/83a1bdc6-098e-43d5-89e5-f4202ecd78a1/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 43541d4cc6f..7b4642fca4e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-26T06:00:17.442696+00:00 +2024-08-26T08:00:22.317199+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-26T05:15:06.140000+00:00 +2024-08-26T07:15:04.420000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261124 +261129 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `5` +- [CVE-2024-41996](CVE-2024/CVE-2024-419xx/CVE-2024-41996.json) (`2024-08-26T06:15:04.603`) +- [CVE-2024-45241](CVE-2024/CVE-2024-452xx/CVE-2024-45241.json) (`2024-08-26T07:15:04.273`) +- [CVE-2024-45256](CVE-2024/CVE-2024-452xx/CVE-2024-45256.json) (`2024-08-26T07:15:04.420`) +- [CVE-2024-6879](CVE-2024/CVE-2024-68xx/CVE-2024-6879.json) (`2024-08-26T06:15:04.867`) +- [CVE-2024-7313](CVE-2024/CVE-2024-73xx/CVE-2024-7313.json) (`2024-08-26T06:15:04.947`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `1` -- [CVE-2024-6729](CVE-2024/CVE-2024-67xx/CVE-2024-6729.json) (`2024-08-26T05:15:05.533`) -- [CVE-2024-6731](CVE-2024/CVE-2024-67xx/CVE-2024-6731.json) (`2024-08-26T05:15:05.717`) -- [CVE-2024-6732](CVE-2024/CVE-2024-67xx/CVE-2024-6732.json) (`2024-08-26T05:15:05.853`) -- [CVE-2024-6802](CVE-2024/CVE-2024-68xx/CVE-2024-6802.json) (`2024-08-26T05:15:05.980`) -- [CVE-2024-6807](CVE-2024/CVE-2024-68xx/CVE-2024-6807.json) (`2024-08-26T05:15:06.140`) +- [CVE-2024-43688](CVE-2024/CVE-2024-436xx/CVE-2024-43688.json) (`2024-08-26T06:15:04.767`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e8c06464df1..90d95ac1913 100644 --- a/_state.csv +++ b/_state.csv @@ -257430,6 +257430,7 @@ CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bf CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913a10,2024-08-07T20:49:50.480000 CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000 CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000 +CVE-2024-41996,1,1,24d30b620328e4a1ddc6323d02003ee6593b93d167646a0c05e3cddcb4949a61,2024-08-26T06:15:04.603000 CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000 CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000 CVE-2024-42005,0,0,a7f5615408f39d5455fecdacdea4974d1dedbdfa4135e3f25797c09478531f93,2024-08-07T20:48:00.083000 @@ -258259,7 +258260,7 @@ CVE-2024-4365,0,0,63c2db9b70aba81bf4acd057c8457c31612ae1811b001c9773701935bfb8f5 CVE-2024-4366,0,0,bbfa79c99a69a6ab3a1454de708e5610ad18f6066e78d9171ac36b6f6e6eece9,2024-05-24T13:03:05.093000 CVE-2024-4367,0,0,53b2562feb1cef4dfbc75c878e502bbc54b7cf80f87613aa8d663f88e3c74ce6,2024-06-10T17:16:33.380000 CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696e1,2024-07-03T02:07:28.557000 -CVE-2024-43688,0,0,92b7e1cdc82297319c60db4f63f97b603b4d70c4801569e1ba7bdd590168d15a,2024-08-20T15:44:20.567000 +CVE-2024-43688,0,1,183995bb01026a87bedbb79531542de0b9c3bb3a4340ab3b594a4b57560529b6,2024-08-26T06:15:04.767000 CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000 @@ -258511,8 +258512,10 @@ CVE-2024-45238,0,0,ccc45be69dfe19e1e7a8bdab1dc3635c5b76d3b76fc80d9b03b5db6c4c8e8 CVE-2024-45239,0,0,c2071b3339b557e4b3c067d45324b1f9fd1fd76e10f09111d85f3447f19fffe5,2024-08-24T23:15:04.353000 CVE-2024-4524,0,0,8e732eea1a281702bf1b965cf73e8243f70f2376e5e0521757bce6618382002a,2024-06-04T19:20:41.520000 CVE-2024-45240,0,0,fccbd301154823cd83da805270cd48452cd27b133537c22483ab00d65d1ebe85,2024-08-24T23:15:04.407000 +CVE-2024-45241,1,1,af5f5a0c8b854edba0041d1ea6ee48ae9fd5c0ae99e35594ac736d7a25a774a2,2024-08-26T07:15:04.273000 CVE-2024-45244,0,0,6e075e943c98352c2e762d260bf382b0036cbff6ae4e654def3cf374015dfff5,2024-08-25T02:15:03.383000 CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d43,2024-06-04T19:20:41.620000 +CVE-2024-45256,1,1,3b5b7e74fab7b325022719d8ef6be5a0fcb0e4a572af048e32edce22c2806aaa,2024-08-26T07:15:04.420000 CVE-2024-45258,0,0,f477567a010a29e06a64d570d29212ea3e6c85c5d662ad9504b5c9c2458e06b1,2024-08-25T22:15:05.233000 CVE-2024-4526,0,0,87a45e4eb41404ceb4b9ba3ca9513f18cac2687a381a0d6211a80485bbac625a,2024-06-04T19:20:41.720000 CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9adfb,2024-06-04T19:20:41.810000 @@ -260304,10 +260307,10 @@ CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f0 CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000 CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000 CVE-2024-6728,0,0,89e66778f2b381ea7c063797a9902e44dbd60e43d41df6b9b479954aa8b57128,2024-08-21T18:08:50.630000 -CVE-2024-6729,0,1,438e935b071d38757a3034c4a57a4b8df633022c3869f5091a76615478d88f37,2024-08-26T05:15:05.533000 +CVE-2024-6729,0,0,438e935b071d38757a3034c4a57a4b8df633022c3869f5091a76615478d88f37,2024-08-26T05:15:05.533000 CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000 -CVE-2024-6731,0,1,3ce04c3e13cb7981fc2651b57874c81aaff6853abe5c82742fe2ff4eea7dd6c4,2024-08-26T05:15:05.717000 -CVE-2024-6732,0,1,94e7f9aa93e0197ba0b26dece5b4e00dfb2504bce0bd8077a5b6d2042b4b4f22,2024-08-26T05:15:05.853000 +CVE-2024-6731,0,0,3ce04c3e13cb7981fc2651b57874c81aaff6853abe5c82742fe2ff4eea7dd6c4,2024-08-26T05:15:05.717000 +CVE-2024-6732,0,0,94e7f9aa93e0197ba0b26dece5b4e00dfb2504bce0bd8077a5b6d2042b4b4f22,2024-08-26T05:15:05.853000 CVE-2024-6733,0,0,2c6af872f9b8e7fd5b566f1882ba0aab1c7fe087e89241fd4a5514342919d09e,2024-08-21T17:00:32.243000 CVE-2024-6734,0,0,99b6c404dde349127fbc4e3a9bddf4648a2734ed6897dbd445a2358ddaf7af89,2024-08-21T17:00:52.007000 CVE-2024-6735,0,0,9ef87cfa7be3ed557a324eb8235c9371d645f72e1b23bc285d329ecd8e5d2258,2024-08-21T17:01:02.657000 @@ -260358,11 +260361,11 @@ CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab046174178 CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000 CVE-2024-6800,0,0,a15298e35d6052e73a8ba7e320d06f1ae120c932f1a3656ad087f1be4be328b2,2024-08-22T15:15:17.127000 CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000 -CVE-2024-6802,0,1,41c45597ef2d2991d0ff5de1c94d34d596167540846175036f3a8eca13168f84,2024-08-26T05:15:05.980000 +CVE-2024-6802,0,0,41c45597ef2d2991d0ff5de1c94d34d596167540846175036f3a8eca13168f84,2024-08-26T05:15:05.980000 CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000 CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d9704,2024-07-24T12:55:13.223000 CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000 -CVE-2024-6807,0,1,07688665534f45cd2e7da0c34e23ec72f349fed7ba2bc33cacddabe8a931b934,2024-08-26T05:15:06.140000 +CVE-2024-6807,0,0,07688665534f45cd2e7da0c34e23ec72f349fed7ba2bc33cacddabe8a931b934,2024-08-26T05:15:06.140000 CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000 CVE-2024-6811,0,0,3783c4b19c44b2b3a4352141b8d7f3cd7a14a6c6285a64de15dc2bfb019618a1,2024-08-23T16:27:10.317000 CVE-2024-6812,0,0,8e1121952c5aeb16bf1d39eda593e33b37b43c381863d39f50a5660da76ba8d3,2024-08-23T16:29:39.737000 @@ -260385,6 +260388,7 @@ CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d537 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000 CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000 +CVE-2024-6879,1,1,0590e201cf5681e59ba1b1a5dabd78b378236e1516262fb902ec44225a9267ac,2024-08-26T06:15:04.867000 CVE-2024-6881,0,0,520f7716290babc1617560777d62fc095cd252de40f50f3ed54fb0f967edb111,2024-08-08T20:24:41.957000 CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1ba,2024-08-21T12:30:33.697000 CVE-2024-6884,0,0,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000 @@ -260664,6 +260668,7 @@ CVE-2024-7308,0,0,ff0d49d6715bec6a8fa55cef81ae277660d9ae735dc8eb5d8914001060fb38 CVE-2024-7309,0,0,0631cf8eb1a47dc64ba800513d438efa35db01116b03be489171df88adabbf79,2024-08-13T15:00:09.397000 CVE-2024-7310,0,0,47e814cc1f6c23f028dc19cfddb4fbb249afc7dd33c54329c346df582cc3dfbb,2024-08-13T15:01:01.970000 CVE-2024-7311,0,0,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda21,2024-08-13T15:03:33.910000 +CVE-2024-7313,1,1,7a4ba952a61a60882b8905e9d68f046a64d2d8d0508ad33e3a6148d0d3a4b2fd,2024-08-26T06:15:04.947000 CVE-2024-7314,0,0,c82905b3df334ceeb097c6861ab91c83e5d51eabc55ac571993838582b95803d,2024-08-05T12:41:45.957000 CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000 CVE-2024-7319,0,0,0bffe027bd25e9cd17fbce9beb09f62a0038f1a01ac652e5cacc1f14534c5492,2024-08-05T12:41:45.957000