CVE-2005-1193 (GCVE-0-2005-1193)
Vulnerability from cvelistv5
Published
2005-05-16 04:00
Modified
2024-08-07 21:44
Severity ?
CWE
  • n/a
Summary
The bbencode_second_pass and make_clickable functions in bbcode.php for phpBB before 2.0.15, as used in viewtopic.php, privmsg.php, and other scripts, allow remote attackers to execute arbitrary script via a BBcode tag with a (1) javascript:, (2) applet:, (3) about:, (4) activex:, (5) chrome:, or (6) script: URI scheme, as demonstrated using the URL tag.
References
cve@mitre.orghttp://castlecops.com/t123194-.html
cve@mitre.orghttp://marc.info/?l=full-disclosure&m=111552510000088&w=2
cve@mitre.orghttp://seclists.org/lists/bugtraq/2005/May/0098.html
cve@mitre.orghttp://secunia.com/advisories/15298Patch
cve@mitre.orghttp://securitytracker.com/id?1013918Patch
cve@mitre.orghttp://securitytracker.com/id?1014117
cve@mitre.orghttp://www.kb.cert.org/vuls/id/113196US Government Resource
cve@mitre.orghttp://www.osvdb.org/16439
cve@mitre.orghttp://www.phpbb.com/phpBB/viewtopic.php?f=14&t=288194Patch
cve@mitre.orghttp://www.securityfocus.com/bid/13545Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/20574
af854a3a-2127-422b-91ae-364da2661108http://castlecops.com/t123194-.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=full-disclosure&m=111552510000088&w=2
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/lists/bugtraq/2005/May/0098.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/15298Patch
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1013918Patch
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1014117
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/113196US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/16439
af854a3a-2127-422b-91ae-364da2661108http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=288194Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/13545Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/20574
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:44:05.302Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1014117",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014117"
          },
          {
            "name": "VU#113196",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/113196"
          },
          {
            "name": "15298",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15298"
          },
          {
            "name": "13545",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/13545"
          },
          {
            "name": "20050508 phpbb 2.0.15 released - patches high critical vuln",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=111552510000088\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.phpbb.com/phpBB/viewtopic.php?f=14\u0026t=288194"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://castlecops.com/t123194-.html"
          },
          {
            "name": "20050507 phpbb 2.0.15 released - patches high critical vuln",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://seclists.org/lists/bugtraq/2005/May/0098.html"
          },
          {
            "name": "1013918",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1013918"
          },
          {
            "name": "phpbb-url-bbcode-file-include(20574)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20574"
          },
          {
            "name": "16439",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/16439"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-05-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The bbencode_second_pass and make_clickable functions in bbcode.php for phpBB before 2.0.15, as used in viewtopic.php, privmsg.php, and other scripts, allow remote attackers to execute arbitrary script via a BBcode tag with a (1) javascript:, (2) applet:, (3) about:, (4) activex:, (5) chrome:, or (6) script: URI scheme, as demonstrated using the URL tag."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1014117",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014117"
        },
        {
          "name": "VU#113196",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/113196"
        },
        {
          "name": "15298",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15298"
        },
        {
          "name": "13545",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/13545"
        },
        {
          "name": "20050508 phpbb 2.0.15 released - patches high critical vuln",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=111552510000088\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.phpbb.com/phpBB/viewtopic.php?f=14\u0026t=288194"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://castlecops.com/t123194-.html"
        },
        {
          "name": "20050507 phpbb 2.0.15 released - patches high critical vuln",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://seclists.org/lists/bugtraq/2005/May/0098.html"
        },
        {
          "name": "1013918",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1013918"
        },
        {
          "name": "phpbb-url-bbcode-file-include(20574)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20574"
        },
        {
          "name": "16439",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/16439"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1193",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The bbencode_second_pass and make_clickable functions in bbcode.php for phpBB before 2.0.15, as used in viewtopic.php, privmsg.php, and other scripts, allow remote attackers to execute arbitrary script via a BBcode tag with a (1) javascript:, (2) applet:, (3) about:, (4) activex:, (5) chrome:, or (6) script: URI scheme, as demonstrated using the URL tag."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1014117",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014117"
            },
            {
              "name": "VU#113196",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/113196"
            },
            {
              "name": "15298",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15298"
            },
            {
              "name": "13545",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/13545"
            },
            {
              "name": "20050508 phpbb 2.0.15 released - patches high critical vuln",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=111552510000088\u0026w=2"
            },
            {
              "name": "http://www.phpbb.com/phpBB/viewtopic.php?f=14\u0026t=288194",
              "refsource": "CONFIRM",
              "url": "http://www.phpbb.com/phpBB/viewtopic.php?f=14\u0026t=288194"
            },
            {
              "name": "http://castlecops.com/t123194-.html",
              "refsource": "MISC",
              "url": "http://castlecops.com/t123194-.html"
            },
            {
              "name": "20050507 phpbb 2.0.15 released - patches high critical vuln",
              "refsource": "BUGTRAQ",
              "url": "http://seclists.org/lists/bugtraq/2005/May/0098.html"
            },
            {
              "name": "1013918",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1013918"
            },
            {
              "name": "phpbb-url-bbcode-file-include(20574)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20574"
            },
            {
              "name": "16439",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/16439"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1193",
    "datePublished": "2005-05-16T04:00:00",
    "dateReserved": "2005-04-21T00:00:00",
    "dateUpdated": "2024-08-07T21:44:05.302Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2005-1193\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-05-16T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The bbencode_second_pass and make_clickable functions in bbcode.php for phpBB before 2.0.15, as used in viewtopic.php, privmsg.php, and other scripts, allow remote attackers to execute arbitrary script via a BBcode tag with a (1) javascript:, (2) applet:, (3) about:, (4) activex:, (5) chrome:, or (6) script: URI scheme, as demonstrated using the URL tag.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3B77B44-C3C9-4BC8-8D39-2200F1BACC07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C74C78D-EEE0-48DF-9721-2A43B996EBD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054EFBD3-2252-4173-B37A-B8CA0218CE0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EB368F-5471-42E3-BBBE-EF9E623A7259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F65406CF-59F1-48DC-8ABC-501F210A8B73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03AC5144-140D-48E9-87FD-96F2E248D4E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F12660-10A7-4B66-94B0-954C9CD7D36C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.6c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D9A19A-7A43-4E67-A5A7-7DF60926EB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.6d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DFBF5F9-AA51-45A7-BE6E-0A06778773B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFBE40D8-27C0-4E06-993E-AA07DCD5B4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69F58020-7D60-4376-BF2B-602A24C3F4EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF566D7-4537-49F6-91BF-F56D64DAE6DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.8a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18657E92-FA64-43CD-98CD-6C9AFAF3C3BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F1F44C-B65B-49C4-B6E8-30560D5B7663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DDE0690-6FB1-4E68-9250-7F45E9044B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D0D9755-845D-4B53-88FA-98665A7240DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"773F6A04-7B8A-4658-AC64-DF8191A9BC26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2BF61F2-C69F-4B3C-92CD-20377C51C8A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEACB9B7-2FA9-4290-94EE-E11DF8F66DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0_beta1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1BACCC9-0871-4BAE-B8E1-783EF6A2DC99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"639E102D-2BD2-42FF-999A-02135A3E5647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA7F5CF1-4610-47D0-A6DD-DCB55645245D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0_rc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB898F63-F327-44B1-B6A2-889E490E583F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpbb_group:phpbb:2.0_rc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894A26BD-2D8B-4DE7-BEE3-940A0498DB74\"}]}]}],\"references\":[{\"url\":\"http://castlecops.com/t123194-.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=full-disclosure\u0026m=111552510000088\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/lists/bugtraq/2005/May/0098.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/15298\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://securitytracker.com/id?1013918\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://securitytracker.com/id?1014117\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/113196\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.osvdb.org/16439\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.phpbb.com/phpBB/viewtopic.php?f=14\u0026t=288194\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/13545\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/20574\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://castlecops.com/t123194-.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=full-disclosure\u0026m=111552510000088\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/lists/bugtraq/2005/May/0098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/15298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://securitytracker.com/id?1013918\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://securitytracker.com/id?1014117\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/113196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.osvdb.org/16439\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.phpbb.com/phpBB/viewtopic.php?f=14\u0026t=288194\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/13545\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/20574\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…