mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-11-26T13:00:20.952055+00:00
This commit is contained in:
parent
a3bb63a63a
commit
e1aec81f90
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-27827",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2021-03-18T17:15:13.510",
|
||||
"lastModified": "2023-11-07T03:21:02.557",
|
||||
"lastModified": "2023-11-26T11:15:07.307",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -218,10 +218,9 @@
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_hmi_unified_comfort_panels_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17",
|
||||
"matchCriteriaId": "CAB60054-8FD0-45A4-B7DC-FFF061764B80"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:siemens:simatic_hmi_unified_comfort_panels:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2921C017-7617-4789-9690-C81EAC4F469D"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -230,9 +229,10 @@
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:siemens:simatic_hmi_unified_comfort_panels:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2921C017-7617-4789-9690-C81EAC4F469D"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_hmi_unified_comfort_panels_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17",
|
||||
"matchCriteriaId": "CAB60054-8FD0-45A4-B7DC-FFF061764B80"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -241,17 +241,6 @@
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "238D992C-6158-4E31-AE0A-7A9C54B51963"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
@ -262,23 +251,23 @@
|
||||
"matchCriteriaId": "65278BA0-3C81-4D81-9801-D7BE3A1D7680"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2009C1FA-96D5-413C-9161-0DB55F841088"
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "238D992C-6158-4E31-AE0A-7A9C54B51963"
|
||||
}
|
||||
]
|
||||
},
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
@ -289,23 +278,23 @@
|
||||
"matchCriteriaId": "350FD323-C876-4C7A-A2E7-4B0660C87F6C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F56E0C04-AEC3-45C8-93E7-FCA3B7F370F6"
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2009C1FA-96D5-413C-9161-0DB55F841088"
|
||||
}
|
||||
]
|
||||
},
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
@ -316,23 +305,23 @@
|
||||
"matchCriteriaId": "0602DEEA-AE39-4A44-9D78-6623943DDCD6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F7747CD-757E-4B36-8F23-7588183948A7"
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F56E0C04-AEC3-45C8-93E7-FCA3B7F370F6"
|
||||
}
|
||||
]
|
||||
},
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
@ -343,23 +332,23 @@
|
||||
"matchCriteriaId": "C1EE2F10-A7A6-486F-AE5C-53AE25BAF200"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB5A494F-2EAB-4647-9A45-5CB0C382E099"
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F7747CD-757E-4B36-8F23-7588183948A7"
|
||||
}
|
||||
]
|
||||
},
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
@ -370,6 +359,17 @@
|
||||
"matchCriteriaId": "F56C2BDC-928E-491A-8E7C-F976B3787C7A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB5A494F-2EAB-4647-9A45-5CB0C382E099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -381,9 +381,9 @@
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98C894B9-C62A-4689-9DA4-D9A3795B8CE5"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "783B50B8-2FB7-4982-88AA-B4F2AD094796"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -392,9 +392,9 @@
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "783B50B8-2FB7-4982-88AA-B4F2AD094796"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98C894B9-C62A-4689-9DA4-D9A3795B8CE5"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -524,6 +524,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-16",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-35498",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2021-02-11T18:15:15.677",
|
||||
"lastModified": "2023-11-07T03:21:55.877",
|
||||
"lastModified": "2023-11-26T11:15:07.937",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -214,6 +214,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJ4DXFJWMZ325ECZXPZOSK7BOEDJZHPR/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-16",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2021/dsa-4852",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-36980",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-07-20T07:15:08.113",
|
||||
"lastModified": "2021-07-28T19:48:38.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-26T11:15:08.053",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-16",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-3905",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-08-23T16:15:10.177",
|
||||
"lastModified": "2022-08-27T02:01:53.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-26T11:15:08.147",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -143,6 +143,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-16",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://ubuntu.com/security/CVE-2021-3905",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-0813",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2022-03-10T17:44:57.003",
|
||||
"lastModified": "2022-03-12T04:23:44.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-26T12:15:06.950",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -124,6 +124,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-17",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information",
|
||||
"source": "cve-coordination@incibe.es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-23807",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-01-22T02:15:07.150",
|
||||
"lastModified": "2022-01-27T14:24:01.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-26T12:15:07.127",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -102,6 +102,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-17",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1/",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-23808",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-01-22T02:15:07.197",
|
||||
"lastModified": "2023-04-29T18:15:39.057",
|
||||
"lastModified": "2023-11-26T12:15:07.213",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -99,6 +99,10 @@
|
||||
"url": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-17",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.phpmyadmin.net/security/PMASA-2022-2/",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4337",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-01-10T22:15:13.933",
|
||||
"lastModified": "2023-01-18T20:26:02.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-26T11:15:08.287",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -132,6 +132,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-16",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5319",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4338",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-01-10T22:15:14.007",
|
||||
"lastModified": "2023-01-18T20:26:07.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-26T11:15:08.393",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -142,6 +142,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-16",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5319",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1668",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-04-10T22:15:09.133",
|
||||
"lastModified": "2023-11-07T04:04:33.040",
|
||||
"lastModified": "2023-11-26T11:15:08.477",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -46,7 +46,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -167,17 +167,6 @@
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:fast_datapath:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A63D05D-BFAF-484B-BA49-5F5E399CDA02"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
@ -193,6 +182,17 @@
|
||||
"matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:fast_datapath:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A63D05D-BFAF-484B-BA49-5F5E399CDA02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -214,6 +214,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2GUNS3WSJG4TUDKZ5L7FXGJMVOD6EJZ/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-16",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5387",
|
||||
"source": "secalert@redhat.com",
|
||||
|
18
README.md
18
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-26T11:01:01.859091+00:00
|
||||
2023-11-26T13:00:20.952055+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-26T09:15:45.077000+00:00
|
||||
2023-11-26T12:15:07.213000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -40,10 +40,18 @@ Recently added CVEs: `0`
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `10`
|
||||
|
||||
* [CVE-2023-0950](CVE-2023/CVE-2023-09xx/CVE-2023-0950.json) (`2023-11-26T09:15:44.177`)
|
||||
* [CVE-2023-2255](CVE-2023/CVE-2023-22xx/CVE-2023-2255.json) (`2023-11-26T09:15:45.077`)
|
||||
* [CVE-2020-27827](CVE-2020/CVE-2020-278xx/CVE-2020-27827.json) (`2023-11-26T11:15:07.307`)
|
||||
* [CVE-2020-35498](CVE-2020/CVE-2020-354xx/CVE-2020-35498.json) (`2023-11-26T11:15:07.937`)
|
||||
* [CVE-2021-36980](CVE-2021/CVE-2021-369xx/CVE-2021-36980.json) (`2023-11-26T11:15:08.053`)
|
||||
* [CVE-2021-3905](CVE-2021/CVE-2021-39xx/CVE-2021-3905.json) (`2023-11-26T11:15:08.147`)
|
||||
* [CVE-2022-4337](CVE-2022/CVE-2022-43xx/CVE-2022-4337.json) (`2023-11-26T11:15:08.287`)
|
||||
* [CVE-2022-4338](CVE-2022/CVE-2022-43xx/CVE-2022-4338.json) (`2023-11-26T11:15:08.393`)
|
||||
* [CVE-2022-0813](CVE-2022/CVE-2022-08xx/CVE-2022-0813.json) (`2023-11-26T12:15:06.950`)
|
||||
* [CVE-2022-23807](CVE-2022/CVE-2022-238xx/CVE-2022-23807.json) (`2023-11-26T12:15:07.127`)
|
||||
* [CVE-2022-23808](CVE-2022/CVE-2022-238xx/CVE-2022-23808.json) (`2023-11-26T12:15:07.213`)
|
||||
* [CVE-2023-1668](CVE-2023/CVE-2023-16xx/CVE-2023-1668.json) (`2023-11-26T11:15:08.477`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user