Skip to content

Commit

Permalink
generated content from 2024-08-30
Browse files Browse the repository at this point in the history
github-actions[bot] committed Aug 30, 2024
1 parent 9464268 commit 838d275
Showing 137 changed files with 3,128 additions and 0 deletions.
136 changes: 136 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
@@ -247773,3 +247773,139 @@ vulnerability,CVE-2023-26321,vulnerability--d9551144-fef1-48ca-aa58-984b8884bbe5
vulnerability,CVE-2023-26324,vulnerability--a7107762-7073-454d-b8ce-3dc73991fef9
vulnerability,CVE-2023-43078,vulnerability--05b9188b-3e40-49ea-ad02-5d378c36f701
vulnerability,CVE-2023-45896,vulnerability--2d027451-9846-437f-bf4f-30bb71a36e97
vulnerability,CVE-2022-2440,vulnerability--87d1c184-29d4-495e-8a7b-2fa7d1684081
vulnerability,CVE-2021-4442,vulnerability--fd3fdc48-1484-4e92-a00a-7740ac8d133d
vulnerability,CVE-2024-41350,vulnerability--bd9a7f7e-d22d-4c7f-b00f-644356e4bee1
vulnerability,CVE-2024-41371,vulnerability--3ad07897-5e61-4e6e-9c4a-88ce254f05aa
vulnerability,CVE-2024-41364,vulnerability--8a1b34d5-dc06-4d82-bd2f-382939670c24
vulnerability,CVE-2024-41918,vulnerability--2680db1e-97d2-42f7-9ca2-4623e7555ccc
vulnerability,CVE-2024-41349,vulnerability--91216c04-a3b3-4dbf-b8a2-6238ee33067b
vulnerability,CVE-2024-41347,vulnerability--b5d9b99a-aa9f-4bb1-b82e-ff23720c6de0
vulnerability,CVE-2024-41346,vulnerability--4e73e746-8ae8-4baa-a600-2eb040787783
vulnerability,CVE-2024-41369,vulnerability--611f19af-7c26-44c7-a63f-5bc49474e1c7
vulnerability,CVE-2024-41358,vulnerability--c3c3bc70-0bde-4eef-8ab7-6ac5b1740f9d
vulnerability,CVE-2024-41361,vulnerability--140fd3fd-9ba4-42a0-b26d-4641a05af6ce
vulnerability,CVE-2024-41964,vulnerability--7c0dd35b-7b6f-4132-86f4-41aa0e927eb1
vulnerability,CVE-2024-41345,vulnerability--a19bd500-f242-4d6b-a6c4-31257d873e90
vulnerability,CVE-2024-41370,vulnerability--162ec8d1-5fd6-4cca-9d3d-b94d508a3346
vulnerability,CVE-2024-41348,vulnerability--c62c0842-1adc-4ce2-b1f9-599fdc595ab7
vulnerability,CVE-2024-41366,vulnerability--ffc3aca0-d12d-4767-9916-13a82e85429d
vulnerability,CVE-2024-41368,vulnerability--435e38d2-d5b5-4e69-992f-bf857c0fd989
vulnerability,CVE-2024-41351,vulnerability--a251761f-3e5e-4dde-88c1-942edd15d5e8
vulnerability,CVE-2024-41372,vulnerability--34b17362-3a15-4589-9127-f5b46bbe5547
vulnerability,CVE-2024-41367,vulnerability--40cd5a62-33df-4deb-87a6-ad4dbad5c4c5
vulnerability,CVE-2024-29725,vulnerability--050b59ca-a4dc-4819-83a2-36ae9d7652b8
vulnerability,CVE-2024-29724,vulnerability--36874e41-a378-4599-a67d-0ed574d6af8a
vulnerability,CVE-2024-29728,vulnerability--b881a6bb-e2bd-4a89-ac23-eaeb1c7316c1
vulnerability,CVE-2024-29726,vulnerability--42e41cce-9a33-4bc1-85b5-a02aecfc10d1
vulnerability,CVE-2024-29723,vulnerability--12270a9f-0224-4860-81a0-ca1de65c9b14
vulnerability,CVE-2024-29729,vulnerability--468cac4e-4e97-48fa-aeda-0b9d61aff577
vulnerability,CVE-2024-29730,vulnerability--e10eefe6-c749-4fa5-8351-10a223dd4a11
vulnerability,CVE-2024-29731,vulnerability--510d2322-985c-4cda-834d-3c051aeb3396
vulnerability,CVE-2024-29727,vulnerability--aef61abd-e4b5-49d5-a510-6031d9255d55
vulnerability,CVE-2024-44779,vulnerability--4bf01be5-6c98-4a05-8358-7ce763f14ff0
vulnerability,CVE-2024-44717,vulnerability--5bf091aa-0648-4d1b-827a-c4eabdf1c2f1
vulnerability,CVE-2024-44776,vulnerability--1f24ac70-3cd6-437c-9b66-4eb0cadd24d7
vulnerability,CVE-2024-44930,vulnerability--0e3cf2f7-de49-47cc-a2e9-6a108361ad44
vulnerability,CVE-2024-44716,vulnerability--f9f7d9bd-2e21-4dd7-8c3b-f79255ceaa5f
vulnerability,CVE-2024-44919,vulnerability--890ad079-69e4-4907-9b23-95a0ff3a362a
vulnerability,CVE-2024-44777,vulnerability--b0e5d8af-6397-4e06-a4ac-0b41e3d7aba3
vulnerability,CVE-2024-44778,vulnerability--9f2782f5-4efc-4982-861c-abd4ee349b62
vulnerability,CVE-2024-34018,vulnerability--96c2863c-b535-43c5-aedd-42c374714e5a
vulnerability,CVE-2024-34019,vulnerability--820e6d66-3f9e-412b-858f-60452485f287
vulnerability,CVE-2024-34017,vulnerability--c6db4a5a-b99a-42af-9042-3c82225df11f
vulnerability,CVE-2024-2541,vulnerability--6c5974bc-ef85-4804-af02-6e201f415b9f
vulnerability,CVE-2024-2502,vulnerability--3c1dd8f8-d2e0-4680-8eac-b4fa663b73ff
vulnerability,CVE-2024-2881,vulnerability--a9771cdb-dcd1-45cf-86e0-327397529719
vulnerability,CVE-2024-38793,vulnerability--f2096451-aef9-40f4-ab5a-d96018063cc0
vulnerability,CVE-2024-38693,vulnerability--e58e02cc-d32c-4e84-acfa-ab97194f3005
vulnerability,CVE-2024-38304,vulnerability--0a63bf18-75dd-4ed1-b758-34bb2263e777
vulnerability,CVE-2024-38303,vulnerability--7c63c51f-609f-4146-9a4b-87cd9f86bc7e
vulnerability,CVE-2024-38795,vulnerability--09080038-38f7-49b9-801a-79308e6775f5
vulnerability,CVE-2024-7857,vulnerability--c943c372-00d0-451a-9073-d85d03cf6d37
vulnerability,CVE-2024-7606,vulnerability--a05840e3-1f60-41b0-b551-5bd599235262
vulnerability,CVE-2024-7132,vulnerability--9535f121-0e13-4649-8950-3ae37e25de1f
vulnerability,CVE-2024-7607,vulnerability--10173689-6bc0-49b0-bc88-c5397125ba0d
vulnerability,CVE-2024-7856,vulnerability--c280b4f7-e964-46c1-9b4d-3b73b4b2787c
vulnerability,CVE-2024-7895,vulnerability--fdda80d6-b34c-4e86-a0b3-e4b4f9bfc789
vulnerability,CVE-2024-7418,vulnerability--d15da26f-22f2-4175-92f4-20cbe8b202c3
vulnerability,CVE-2024-1384,vulnerability--c5ac2b06-0e05-4c80-a03f-2e6f920a8f7a
vulnerability,CVE-2024-1543,vulnerability--03f38113-753c-4938-8be4-ed0c52bc980f
vulnerability,CVE-2024-1545,vulnerability--c1813291-b4bb-483e-9b66-a15e3529eb7c
vulnerability,CVE-2024-1056,vulnerability--2b24daf8-f9a3-40c9-8373-25331a479695
vulnerability,CVE-2024-39622,vulnerability--d4101de6-154f-48be-b4a7-41a09e717da7
vulnerability,CVE-2024-39620,vulnerability--170d8a92-9718-4dd6-a0d5-87116a6a1d49
vulnerability,CVE-2024-39653,vulnerability--a61a5d15-4a3a-4e40-a59c-7a8f78952636
vulnerability,CVE-2024-39658,vulnerability--f8691b68-c3a6-43b6-b5d3-4a032980139f
vulnerability,CVE-2024-39638,vulnerability--38dabd2c-073e-4fb3-a331-6976c9c1854d
vulnerability,CVE-2024-43946,vulnerability--738aa3fc-5dcd-409d-8988-506076244f30
vulnerability,CVE-2024-43918,vulnerability--f0bad7e7-cfe8-4fd9-8347-76199d0c83c4
vulnerability,CVE-2024-43955,vulnerability--445560c7-4634-4dcd-836f-cf0b590bec8f
vulnerability,CVE-2024-43144,vulnerability--30499c9b-47c9-4fdf-80f1-08dbe2d9a6c1
vulnerability,CVE-2024-43921,vulnerability--20f04a43-0d45-4b03-9641-6d02cc2f5eae
vulnerability,CVE-2024-43949,vulnerability--0f0dc1c8-935c-43c1-bf0c-2ca2d5423db9
vulnerability,CVE-2024-43943,vulnerability--fa85f95b-149f-408d-9f62-d2f8c1afc235
vulnerability,CVE-2024-43941,vulnerability--e0c7a7a6-4f3c-445d-bc97-7bbafc235164
vulnerability,CVE-2024-43700,vulnerability--ab493253-3c2d-4bf2-821f-be37300a5666
vulnerability,CVE-2024-43920,vulnerability--c69296b1-8399-40b5-b4d9-e17ad4e1501f
vulnerability,CVE-2024-43917,vulnerability--14641c1b-1be0-4164-b0bc-2d69f1636bad
vulnerability,CVE-2024-43922,vulnerability--0b191f8f-4ee4-41b8-bee5-7da285d61c0c
vulnerability,CVE-2024-43940,vulnerability--4b0158be-e112-48c8-b0ca-55e2ece42fa4
vulnerability,CVE-2024-43132,vulnerability--6f8e291e-d4fa-406d-9045-5956edd20782
vulnerability,CVE-2024-43845,vulnerability--dc206a30-e691-458a-aeeb-d7b425f81faa
vulnerability,CVE-2024-43958,vulnerability--6e144149-1b6a-48df-b815-217c347d2576
vulnerability,CVE-2024-43935,vulnerability--acef20a0-2ab3-45a0-ad70-8c7f7dffa956
vulnerability,CVE-2024-43954,vulnerability--3264e325-7ed3-4f60-a081-e3b55fccdbef
vulnerability,CVE-2024-43957,vulnerability--e9e505c1-2798-42fb-bd18-217773662a2b
vulnerability,CVE-2024-43960,vulnerability--5ad6cee5-90f4-41ab-9284-4dd1a38e3b1c
vulnerability,CVE-2024-43931,vulnerability--c1c5ca34-aa02-4d39-9d6b-428ae3b3f55d
vulnerability,CVE-2024-43934,vulnerability--6aa4edbf-3dae-4288-8ce4-37139a8a5855
vulnerability,CVE-2024-43951,vulnerability--f2c9ed97-623d-4225-b4d8-76e70ba0a8e1
vulnerability,CVE-2024-43936,vulnerability--b1106442-674e-412a-9d74-bc0e3ac99101
vulnerability,CVE-2024-43942,vulnerability--74f73f04-7beb-4fc4-936d-09e457276994
vulnerability,CVE-2024-43964,vulnerability--250ba551-9ae5-4588-b897-f43db98fd305
vulnerability,CVE-2024-43950,vulnerability--cb301674-9a14-4b50-bd78-6658e7781629
vulnerability,CVE-2024-43965,vulnerability--a50b2732-a881-4891-82f1-1808321b7797
vulnerability,CVE-2024-43939,vulnerability--78a26130-f85e-4e6d-b17e-bc0f6f529832
vulnerability,CVE-2024-43947,vulnerability--8610fa4e-983a-4f3d-b109-2da84bf31c9a
vulnerability,CVE-2024-43804,vulnerability--a9e0afa5-eb87-4df9-a7fb-b5f78c99e0e0
vulnerability,CVE-2024-43953,vulnerability--ebf63f45-3b0c-4ba9-95bd-df68f70c729b
vulnerability,CVE-2024-43944,vulnerability--75892214-b1d1-4a1c-a116-30224d1518df
vulnerability,CVE-2024-43963,vulnerability--54da2100-1053-458c-94df-32c81804e5c8
vulnerability,CVE-2024-43952,vulnerability--02a0a5d0-22dd-4b05-8720-aab0c6329449
vulnerability,CVE-2024-43926,vulnerability--5a1a29f2-da96-4e99-bfed-a171e866f5c1
vulnerability,CVE-2024-43948,vulnerability--4f677f42-a740-43d1-9aa5-d5337596721b
vulnerability,CVE-2024-43961,vulnerability--d9e575e8-38df-4465-ab8f-badc483141d8
vulnerability,CVE-2024-43986,vulnerability--29edb3df-32b3-416a-88ed-f7dfb2b18c65
vulnerability,CVE-2024-5987,vulnerability--95954fb6-206c-403b-b91b-2f53812ffd28
vulnerability,CVE-2024-5624,vulnerability--f2917f60-08dd-4a44-8a0d-d992bd3f3c67
vulnerability,CVE-2024-5623,vulnerability--fae2412c-7ebe-47a3-936d-6b74d6ac1aa0
vulnerability,CVE-2024-5857,vulnerability--eec7adae-faf4-41a4-92e1-26ef7bd389f4
vulnerability,CVE-2024-5417,vulnerability--fcc1244e-e46b-4f62-9131-42a45267701d
vulnerability,CVE-2024-5622,vulnerability--d2b0b802-d1e2-4516-b10d-743c08c9d24d
vulnerability,CVE-2024-5057,vulnerability--bd0e641f-5950-4a64-9780-25ab894a3e51
vulnerability,CVE-2024-4428,vulnerability--369f72ac-8715-4f24-83b7-0d80b01927d0
vulnerability,CVE-2024-8304,vulnerability--b21adc79-1628-4e0e-a043-177e5d9605ab
vulnerability,CVE-2024-8302,vulnerability--8a8700dc-b88c-443e-a07e-fb8e72ba059e
vulnerability,CVE-2024-8295,vulnerability--365e869d-5388-43ac-91b6-7573106c3fdf
vulnerability,CVE-2024-8296,vulnerability--11916870-c492-4fbb-865f-64d3b80cea14
vulnerability,CVE-2024-8294,vulnerability--63568b2a-2cfb-468a-8691-aa8312ea28c1
vulnerability,CVE-2024-8255,vulnerability--8394655c-2362-4758-a040-367a58f4bad2
vulnerability,CVE-2024-8301,vulnerability--24923750-6718-4294-bfba-5c76ec7b8fed
vulnerability,CVE-2024-8297,vulnerability--faf977f2-995c-4ece-b3a3-86118c8f0f62
vulnerability,CVE-2024-8303,vulnerability--4a210028-ae4d-464d-b77a-3f57efef6c73
vulnerability,CVE-2024-3679,vulnerability--75dd572a-c893-4c8d-ba30-24425b986356
vulnerability,CVE-2024-3944,vulnerability--3ed37db6-5b37-4a29-a0d0-d29b2ddfc05f
vulnerability,CVE-2024-45045,vulnerability--c1d548bf-ae24-415f-84b8-edb7903ef1cd
vulnerability,CVE-2024-45440,vulnerability--e0346d04-5b43-4016-b6db-1ad89060afb1
vulnerability,CVE-2024-45435,vulnerability--dd84044f-1c89-41f7-be95-51f793ae23ef
vulnerability,CVE-2024-45056,vulnerability--dac513db-9b9f-4559-b991-a21004982ffc
vulnerability,CVE-2024-45436,vulnerability--22ea1da0-5fe9-4c5c-bbf2-4d73543ca58a
vulnerability,CVE-2024-45302,vulnerability--40c33c78-166d-473c-9f1d-1d750da81a34
vulnerability,CVE-2024-6670,vulnerability--6d1309fb-9ab1-4d85-8ddb-c40c81e94549
vulnerability,CVE-2024-6927,vulnerability--8f3ebf8b-fe22-489d-bae2-cb8e7c09c5d2
vulnerability,CVE-2024-6551,vulnerability--2ed34515-0447-4173-b702-0320865cbe73
vulnerability,CVE-2024-6672,vulnerability--63aa2838-6c7e-4153-981b-5696c17060a4
vulnerability,CVE-2024-6671,vulnerability--09b0d7c6-30ba-4697-ae58-4dbf214ff3ef
vulnerability,CVE-2024-35118,vulnerability--216adadb-f9b9-45d6-9eb3-433d4e519e8b
vulnerability,CVE-2024-35133,vulnerability--2f67c5b0-b070-459d-9bbb-e4a85d64a525
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7106431f-1007-4d55-b3e9-36e39b6444e7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02a0a5d0-22dd-4b05-8720-aab0c6329449",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-30T00:19:21.573386Z",
"modified": "2024-08-30T00:19:21.573386Z",
"name": "CVE-2024-43952",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Esotera allows Stored XSS.This issue affects Esotera: from n/a through 1.2.5.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43952"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7e4fe3d8-89d9-4a59-aaa9-69346af3dfc6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03f38113-753c-4938-8be4-ed0c52bc980f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-30T00:19:21.122312Z",
"modified": "2024-08-30T00:19:21.122312Z",
"name": "CVE-2024-1543",
"description": "The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1543"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7a431488-93a8-4717-a83d-4287d3531fe4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--050b59ca-a4dc-4819-83a2-36ae9d7652b8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-30T00:19:20.017638Z",
"modified": "2024-08-30T00:19:20.017638Z",
"name": "CVE-2024-29725",
"description": "SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/sort_bloques/, parameter list.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-29725"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--755e981e-29d7-485a-9401-5681805f9894",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09080038-38f7-49b9-801a-79308e6775f5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-30T00:19:20.790835Z",
"modified": "2024-08-30T00:19:20.790835Z",
"name": "CVE-2024-38795",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CridioStudio ListingPro allows SQL Injection.This issue affects ListingPro: from n/a through 2.9.4.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38795"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c7106dad-4798-4ae4-8f98-f2813854bf46",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09b0d7c6-30ba-4697-ae58-4dbf214ff3ef",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-30T00:19:22.122308Z",
"modified": "2024-08-30T00:19:22.122308Z",
"name": "CVE-2024-6671",
"description": "In WhatsUp Gold versions released before 2024.0.0, if the application is configured with only a single user, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6671"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--571d5aa7-00e1-4a6d-b350-b6ab37dd9972",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a63bf18-75dd-4ed1-b758-34bb2263e777",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-30T00:19:20.758685Z",
"modified": "2024-08-30T00:19:20.758685Z",
"name": "CVE-2024-38304",
"description": "Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38304"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d379e175-aa31-4412-83ca-e742f33d1bd9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b191f8f-4ee4-41b8-bee5-7da285d61c0c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-30T00:19:21.530465Z",
"modified": "2024-08-30T00:19:21.530465Z",
"name": "CVE-2024-43922",
"description": "Improper Control of Generation of Code ('Code Injection') vulnerability in NitroPack Inc. NitroPack allows Code Injection.This issue affects NitroPack: from n/a through 1.16.7.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43922"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--eb63cae3-2891-4134-aa1e-ffd3cd64c9fb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0e3cf2f7-de49-47cc-a2e9-6a108361ad44",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-30T00:19:20.198985Z",
"modified": "2024-08-30T00:19:20.198985Z",
"name": "CVE-2024-44930",
"description": "Serilog before v2.1.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44930"
}
]
}
]
}
Loading

0 comments on commit 838d275

Please sign in to comment.