mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 02:00:53 +00:00
Auto-Update: 2024-12-02T13:01:29.638877+00:00
This commit is contained in:
parent
be6f0392d1
commit
ba65a84894
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An \u201cAuthentication Bypass Using an Alternate Path or Channel\u201d vulnerability in the OPC UA Server configuration required for B&R mapp Cockpit before 6.0, B&R mapp View before 6.0, B&R mapp Services before 6.0, B&R mapp Motion before 6.0 and B&R mapp Vision before 6.0 may be used by an unauthenticated network-based attacker to cause information disclosure, unintended change of data, or denial of service conditions.\nB&R mapp Services is only affected, when mpUserX or mpCodeBox are used in the Automation Studio project."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de \u201cOmisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo\u201d en la configuraci\u00f3n del servidor OPC UA requerida para B&R mapp Cockpit anterior a la versi\u00f3n 6.0, B&R mapp View anterior a la versi\u00f3n 6.0, B&R mapp Services anterior a la versi\u00f3n 6.0, B&R mapp Motion anterior a la versi\u00f3n 6.0 y B&R mapp Vision anterior a la versi\u00f3n 6.0 puede ser utilizada por un atacante no autenticado basado en la red para provocar la divulgaci\u00f3n de informaci\u00f3n, un cambio no intencionado de datos o condiciones de denegaci\u00f3n de servicio. B&R mapp Services solo se ve afectado cuando se utilizan mpUserX o mpCodeBox en el proyecto de Automation Studio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
60
CVE-2024/CVE-2024-330xx/CVE-2024-33036.json
Normal file
60
CVE-2024/CVE-2024-330xx/CVE-2024-33036.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33036",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:06.840",
|
||||
"lastModified": "2024-12-02T11:15:06.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while parsing sensor packets in camera driver, user-space variable is used while allocating memory in kernel and parsing which can lead to huge allocation or invalid memory access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria al analizar paquetes de sensores en el controlador de la c\u00e1mara, se utiliza una variable de espacio de usuario al asignar memoria en el kernel y analizar, lo que puede generar una asignaci\u00f3n enorme o un acceso a memoria no v\u00e1lido."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-823"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-330xx/CVE-2024-33037.json
Normal file
60
CVE-2024/CVE-2024-330xx/CVE-2024-33037.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33037",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:07.753",
|
||||
"lastModified": "2024-12-02T11:15:07.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Information disclosure as NPU firmware can send invalid IPC message to NPU driver as the driver doesn`t validate the IPC message received from the firmware."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " La divulgaci\u00f3n de informaci\u00f3n ya que el firmware de la NPU puede enviar un mensaje IPC no v\u00e1lido al controlador de la NPU ya que el controlador no valida el mensaje IPC recibido del firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-330xx/CVE-2024-33039.json
Normal file
60
CVE-2024/CVE-2024-330xx/CVE-2024-33039.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33039",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:07.920",
|
||||
"lastModified": "2024-12-02T11:15:07.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption when PAL client calls PAL service APIs by passing a random value as handle and the handle is not validated by the service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria cuando el cliente PAL llama a las API del servicio PAL pasando un valor aleatorio como identificador y el servicio no valida el identificador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-822"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-330xx/CVE-2024-33040.json
Normal file
60
CVE-2024/CVE-2024-330xx/CVE-2024-33040.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33040",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:08.070",
|
||||
"lastModified": "2024-12-02T11:15:08.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while invoking redundant release command to release one buffer from user space as race condition can occur in kernel space between buffer release and buffer access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Puede ocurrir corrupci\u00f3n de memoria al invocar el comando de liberaci\u00f3n redundante para liberar un b\u00fafer del espacio del usuario como condici\u00f3n de ejecuci\u00f3n en el espacio del n\u00facleo entre la liberaci\u00f3n del b\u00fafer y el acceso al b\u00fafer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-330xx/CVE-2024-33044.json
Normal file
60
CVE-2024/CVE-2024-330xx/CVE-2024-33044.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33044",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:08.233",
|
||||
"lastModified": "2024-12-02T11:15:08.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while Configuring the SMR/S2CR register in Bypass mode."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria al configurar el registro SMR/S2CR en modo Bypass."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-330xx/CVE-2024-33053.json
Normal file
60
CVE-2024/CVE-2024-330xx/CVE-2024-33053.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33053",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:08.423",
|
||||
"lastModified": "2024-12-02T11:15:08.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption when multiple threads try to unregister the CVP buffer at the same time."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria cuando varios subprocesos intentan anular el registro del b\u00fafer CVP al mismo tiempo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-330xx/CVE-2024-33056.json
Normal file
60
CVE-2024/CVE-2024-330xx/CVE-2024-33056.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33056",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:08.600",
|
||||
"lastModified": "2024-12-02T11:15:08.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption when allocating and accessing an entry in an SMEM partition continuously."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria al asignar y acceder a una entrada en una partici\u00f3n SMEM de forma continua."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-330xx/CVE-2024-33063.json
Normal file
60
CVE-2024/CVE-2024-330xx/CVE-2024-33063.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33063",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:08.783",
|
||||
"lastModified": "2024-12-02T11:15:08.783",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Transient DOS while parsing the ML IE when a beacon with common info length of the ML IE greater than the ML IE inside which this element is present."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " DOS transitorio mientras se analiza el ML IE cuando una baliza con una longitud de informaci\u00f3n com\u00fan del ML IE es mayor que el ML IE dentro del cual est\u00e1 presente este elemento."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-430xx/CVE-2024-43048.json
Normal file
60
CVE-2024/CVE-2024-430xx/CVE-2024-43048.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-43048",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:08.960",
|
||||
"lastModified": "2024-12-02T11:15:08.960",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption when invalid input is passed to invoke GPU Headroom API call."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria cuando se pasa una entrada no v\u00e1lida para invocar la llamada GPU Headroom API."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-430xx/CVE-2024-43049.json
Normal file
60
CVE-2024/CVE-2024-430xx/CVE-2024-43049.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-43049",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:09.120",
|
||||
"lastModified": "2024-12-02T11:15:09.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while invoking IOCTL calls from user space to set generic private command inside WLAN driver."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria al invocar llamadas IOCTL desde el espacio del usuario para establecer un comando privado gen\u00e9rico dentro del controlador WLAN."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-430xx/CVE-2024-43050.json
Normal file
60
CVE-2024/CVE-2024-430xx/CVE-2024-43050.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-43050",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:09.280",
|
||||
"lastModified": "2024-12-02T11:15:09.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while invoking IOCTL calls from user space to issue factory test command inside WLAN driver."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria al invocar llamadas IOCTL desde el espacio del usuario para emitir un comando de prueba de f\u00e1brica dentro del controlador WLAN."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-430xx/CVE-2024-43052.json
Normal file
60
CVE-2024/CVE-2024-430xx/CVE-2024-43052.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-43052",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:09.443",
|
||||
"lastModified": "2024-12-02T11:15:09.443",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while processing API calls to NPU with invalid input."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria al procesar llamadas API a NPU con entrada no v\u00e1lida."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-430xx/CVE-2024-43053.json
Normal file
60
CVE-2024/CVE-2024-430xx/CVE-2024-43053.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-43053",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-12-02T11:15:09.603",
|
||||
"lastModified": "2024-12-02T11:15:09.603",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while invoking IOCTL calls from user space to read WLAN target diagnostic information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria al invocar llamadas IOCTL desde el espacio del usuario para leer informaci\u00f3n de diagn\u00f3stico del objetivo WLAN."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-02T11:01:05.006227+00:00
|
||||
2024-12-02T13:01:29.638877+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-02T09:15:04.613000+00:00
|
||||
2024-12-02T11:15:09.603000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,20 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271770
|
||||
271783
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2024-10490](CVE-2024/CVE-2024-104xx/CVE-2024-10490.json) (`2024-12-02T09:15:04.613`)
|
||||
- [CVE-2024-33036](CVE-2024/CVE-2024-330xx/CVE-2024-33036.json) (`2024-12-02T11:15:06.840`)
|
||||
- [CVE-2024-33037](CVE-2024/CVE-2024-330xx/CVE-2024-33037.json) (`2024-12-02T11:15:07.753`)
|
||||
- [CVE-2024-33039](CVE-2024/CVE-2024-330xx/CVE-2024-33039.json) (`2024-12-02T11:15:07.920`)
|
||||
- [CVE-2024-33040](CVE-2024/CVE-2024-330xx/CVE-2024-33040.json) (`2024-12-02T11:15:08.070`)
|
||||
- [CVE-2024-33044](CVE-2024/CVE-2024-330xx/CVE-2024-33044.json) (`2024-12-02T11:15:08.233`)
|
||||
- [CVE-2024-33053](CVE-2024/CVE-2024-330xx/CVE-2024-33053.json) (`2024-12-02T11:15:08.423`)
|
||||
- [CVE-2024-33056](CVE-2024/CVE-2024-330xx/CVE-2024-33056.json) (`2024-12-02T11:15:08.600`)
|
||||
- [CVE-2024-33063](CVE-2024/CVE-2024-330xx/CVE-2024-33063.json) (`2024-12-02T11:15:08.783`)
|
||||
- [CVE-2024-43048](CVE-2024/CVE-2024-430xx/CVE-2024-43048.json) (`2024-12-02T11:15:08.960`)
|
||||
- [CVE-2024-43049](CVE-2024/CVE-2024-430xx/CVE-2024-43049.json) (`2024-12-02T11:15:09.120`)
|
||||
- [CVE-2024-43050](CVE-2024/CVE-2024-430xx/CVE-2024-43050.json) (`2024-12-02T11:15:09.280`)
|
||||
- [CVE-2024-43052](CVE-2024/CVE-2024-430xx/CVE-2024-43052.json) (`2024-12-02T11:15:09.443`)
|
||||
- [CVE-2024-43053](CVE-2024/CVE-2024-430xx/CVE-2024-43053.json) (`2024-12-02T11:15:09.603`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-10490](CVE-2024/CVE-2024-104xx/CVE-2024-10490.json) (`2024-12-02T09:15:04.613`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
15
_state.csv
15
_state.csv
@ -243033,7 +243033,7 @@ CVE-2024-10486,0,0,6b6a9c7c1d7688efbd788cfa89c1b8eec85247981e0e8dab673908aaadf96
|
||||
CVE-2024-10487,0,0,78655a991e24aa9dd082cd3faff3773a1cc1b0ed3ddfc55ae09b7e96ee30ac89,2024-11-01T12:57:35.843000
|
||||
CVE-2024-10488,0,0,045961a4da52daca0a2cd9eefa7cb2efdc030f8f660cedb82c9b820a312a0393,2024-11-01T12:57:35.843000
|
||||
CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000
|
||||
CVE-2024-10490,1,1,540e3d433c2a7b5c13078c69c944691f837d8e34471f02dddb654091c4fc6fe5,2024-12-02T09:15:04.613000
|
||||
CVE-2024-10490,0,1,abae587613dea9a6dbb3f017687200a71977d37a7c7f2121132f96d39bada6dd,2024-12-02T09:15:04.613000
|
||||
CVE-2024-10491,0,0,e248bde85b2f7fd1287809048c400717455f435ea164b73bd377fe9febeb3eb0,2024-11-06T23:08:49.780000
|
||||
CVE-2024-10492,0,0,a604e2796b006c65216b1c0eacba3562048fb386350f20f059e5d64c58a4853f,2024-11-25T08:15:08.453000
|
||||
CVE-2024-10493,0,0,8b36ab5511eb3bbf88fe3b986fb9a2e12d56937db7b6e071f13b5eb806dc7131,2024-11-29T16:15:08.583000
|
||||
@ -254538,9 +254538,14 @@ CVE-2024-33032,0,0,98ee54090123171615e158b27044fae77331db53953631f8b90c74c1f7493
|
||||
CVE-2024-33033,0,0,4ecde980d061a097abb6c1ea846d9ab81a0ba801acd0bcdb214e87c679daef4c,2024-11-07T19:39:24.863000
|
||||
CVE-2024-33034,0,0,e88e5493c643619d79b7a0e6414306006539dc4b0eb6352ed218b58798008272,2024-11-20T13:54:40.360000
|
||||
CVE-2024-33035,0,0,a2cbf1ac3ca408060419991a03b24932660c70b02e16b8809b1fde0e9b502e88,2024-09-03T12:59:02.453000
|
||||
CVE-2024-33036,1,1,6f25ea2f9c4bb2d4d0f04cb269c78494099c96655f7a7e16ea958b5dbc87ecaf,2024-12-02T11:15:06.840000
|
||||
CVE-2024-33037,1,1,68cf0e606e759d8048c47a1a58c833190e6481c5b3bff36a2ff0a2574775fa75,2024-12-02T11:15:07.753000
|
||||
CVE-2024-33038,0,0,d174e8cb32f352bb37d4cf42fb06ed39c66af4e6d398e5501824f9508319fcd5,2024-09-04T17:21:28.943000
|
||||
CVE-2024-33039,1,1,321101db0fe412b92320a4c7971351343c5da08861c2971314eafcf40a94c74f,2024-12-02T11:15:07.920000
|
||||
CVE-2024-33040,1,1,557d3c60435c4de81954a3cc1ef65d7bb745ea24893ed069ded6749d1fe2ed8b,2024-12-02T11:15:08.070000
|
||||
CVE-2024-33042,0,0,4b177417250f6f5481ff89aae684855afcf48f2fdcb2418d54c43ca978dae432,2024-09-04T17:08:07.433000
|
||||
CVE-2024-33043,0,0,e440b5c9b2a1727157025810ce1b92ddb45351842873f98e286f1378d612b47c,2024-09-03T12:59:02.453000
|
||||
CVE-2024-33044,1,1,579c36860147f181fc923fd62199d7d8dcb0c2ef676cd46f5480f4491cc20c6d,2024-12-02T11:15:08.233000
|
||||
CVE-2024-33045,0,0,c750be85f91783e59cd18e60c65725c2f8e2b0f2771fc29ca9f691ba1ec0dcfe,2024-09-04T17:20:55.297000
|
||||
CVE-2024-33047,0,0,cb0eb88ac7f41a9c98cf0d3c8ebd2b1f66d8a5c56732d8ae21823446d39c74ab,2024-09-04T17:07:31.877000
|
||||
CVE-2024-33048,0,0,f9f67875b847da24eb9cf137e9f097d769cd7f8f3d65d24eb4619818f972d900,2024-09-04T17:20:01.083000
|
||||
@ -254549,10 +254554,13 @@ CVE-2024-3305,0,0,60cb4bdd6aab216e8dcee2531752f4a05622ff14e3e073fcab37d9212a2d0c
|
||||
CVE-2024-33050,0,0,90923f1d1865d88057676c94e2b893aea7270f8731add142aed38ad6597070db,2024-09-04T17:07:13.930000
|
||||
CVE-2024-33051,0,0,1fd409b2ba830a4d68baa6f497a6e4704a55e16bd6f855473d9753382be831b5,2024-09-04T17:18:10.950000
|
||||
CVE-2024-33052,0,0,13554474bfa747d124854139f3134a9830507865a3c50c094520491b9689b9b9,2024-09-04T17:18:07.783000
|
||||
CVE-2024-33053,1,1,14690055ae147c383e68cd73b5110438c5a3e366507cb1f3475694b5bc488b63,2024-12-02T11:15:08.423000
|
||||
CVE-2024-33054,0,0,67fa57bf4b27f2520026aaaf6b13807e21cefd1307528e92c6c6a61d930ac6dc,2024-09-04T17:06:47.337000
|
||||
CVE-2024-33056,1,1,df4ec0f261a0ae4864165c553dc06cc6012d32ac431b99867b1541d1ea954cef,2024-12-02T11:15:08.600000
|
||||
CVE-2024-33057,0,0,fc38afeaa7486b0a5aebc4f1315319ab783e3abf0a4193027aaf853eaf32aed0,2024-09-04T17:06:24.843000
|
||||
CVE-2024-3306,0,0,395196a450f14ac42a9c4c7d5b943f8723d96e3f07723d87dcdff36c939bae9a,2024-09-19T14:43:51.830000
|
||||
CVE-2024-33060,0,0,8e20f230158ec785e72e303f04a05aee62188eb8b143d335c7e1363dc54b78e7,2024-09-04T17:06:08.407000
|
||||
CVE-2024-33063,1,1,c0f5ff1c34636507c2a8fc61ff59f5ba1f578c53cf4eac7955002a5a74a16022,2024-12-02T11:15:08.783000
|
||||
CVE-2024-33064,0,0,bfbd742ae234880f52f67d6978c158799c406232f5aac7c3edf51ec757747c4a,2024-10-16T19:52:54.483000
|
||||
CVE-2024-33065,0,0,e28bf41f307659f4fb4f14868be73b5e9d88ec7819cf206c24cd9f25c36ab870,2024-10-16T19:50:45.190000
|
||||
CVE-2024-33066,0,0,66a8d9354112b9051cf178fd2c2f4c437b5cf34f4a798a9546a14ff489506cc8,2024-10-16T19:49:40.333000
|
||||
@ -261626,7 +261634,12 @@ CVE-2024-43042,0,0,d94e46af540f49a4f3c40e5f52dafd9243317a2003df44ac76bccf484c7ee
|
||||
CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
|
||||
CVE-2024-43045,0,0,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000
|
||||
CVE-2024-43047,0,0,0d74f1bcc5dc754e35ff59d035ec7a934e6a0f15d06acedd36f35069ccd0e437,2024-10-09T14:39:06.540000
|
||||
CVE-2024-43048,1,1,12ab5658c6dc9f8e6451ae0126e5d91f20dfb5810c0021f63e3d0783f6e9e308,2024-12-02T11:15:08.960000
|
||||
CVE-2024-43049,1,1,afb5241eb91645f4eee2c10d59701cd1ac23510a32165c2b11aac0a04d3fb792,2024-12-02T11:15:09.120000
|
||||
CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000
|
||||
CVE-2024-43050,1,1,1d6b3d0f4543f84f03bf2f16e40dc88adb35b5a08599678f58cf9e1c1b190a63,2024-12-02T11:15:09.280000
|
||||
CVE-2024-43052,1,1,14f3e857f33c22a8433386e59a6e95ce8612c123b8ec9eb3196c6be7caa30f46,2024-12-02T11:15:09.443000
|
||||
CVE-2024-43053,1,1,6408912b985709e7cc41d2bc00a03a756e0c4452731e8948f4d262d555ee5e19,2024-12-02T11:15:09.603000
|
||||
CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user