Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-6410 | First vendor Publication | 2014-09-28 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 4.7 | Attack Range | Local |
Cvss Impact Score | 6.9 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The __udf_read_inode function in fs/udf/inode.c in the Linux kernel through 3.16.3 does not restrict the amount of ICB indirection, which allows physically proximate attackers to cause a denial of service (infinite loop or stack consumption) via a UDF filesystem with a crafted inode. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:27182 | |||
Oval ID: | oval:org.mitre.oval:def:27182 | ||
Title: | USN-2375-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2375-1 CVE-2014-3184 CVE-2014-3185 CVE-2014-6410 | Version: | 3 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27719 | |||
Oval ID: | oval:org.mitre.oval:def:27719 | ||
Title: | SUSE-SU-2014:1316-1 -- Security update for Linux kernel (important) | ||
Description: | The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix various bugs and security issues. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1316-1 CVE-2013-1979 CVE-2014-1739 CVE-2014-2706 CVE-2014-4027 CVE-2014-4171 CVE-2014-4508 CVE-2014-4667 CVE-2014-4943 CVE-2014-5077 CVE-2014-5471 CVE-2014-5472 CVE-2014-3153 CVE-2014-6410 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | Linux kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28305 | |||
Oval ID: | oval:org.mitre.oval:def:28305 | ||
Title: | ELSA-2014-3103 -- Unbreakable Enterprise kernel security update (important) | ||
Description: | kernel-uek [3.8.13-55.1.1] - ALSA: control: Protect user controls against concurrent access (Lars-Peter Clausen) [Orabug: 20192540] {CVE-2014-4652} - target/rd: Refactor rd_build_device_space + rd_release_device_space (Nicholas Bellinger) [Orabug: 20192516] {CVE-2014-4027} - HID: logitech: perform bounds checking on device_id early enough (Jiri Kosina) [Orabug: 20192477] {CVE-2014-3182} - udf: Avoid infinite loop when processing indirect ICBs (Jan Kara) [Orabug: 20192448] {CVE-2014-6410} - ALSA: control: Make sure that id->index does not overflow (Lars-Peter Clausen) [Orabug: 20192416] {CVE-2014-4656} - ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug: 20192367] {CVE-2014-4656} - HID: picolcd: sanity check report size in raw_event() callback (Jiri Kosina) [Orabug: 20192208] {CVE-2014-3186} - net: sctp: fix remote memory pressure from excessive queueing (Daniel Borkmann) [Orabug: 20192058] {CVE-2014-3688} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-3103 CVE-2014-3182 CVE-2014-3186 CVE-2014-3688 CVE-2014-4027 CVE-2014-4652 CVE-2014-4656 CVE-2014-6410 | Version: | 5 |
Platform(s): | Oracle Linux 6 Oracle Linux 7 | Product(s): | kernel-uek |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28399 | |||
Oval ID: | oval:org.mitre.oval:def:28399 | ||
Title: | RHSA-2014:1971 -- kernel security and bug fix update (Important) | ||
Description: | The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel's SCTP implementation handled malformed or duplicate Address Configuration Change Chunks (ASCONF). A remote attacker could use either of these flaws to crash the system. (CVE-2014-3673, CVE-2014-3687, Important) * A flaw was found in the way the Linux kernel's SCTP implementation handled the association's output queue. A remote attacker could send specially crafted packets that would cause the system to use an excessive amount of memory, leading to a denial of service. (CVE-2014-3688, Important) * Two flaws were found in the way the Apple Magic Mouse/Trackpad multi-touch driver and the Minibox PicoLCD driver handled invalid HID reports. An attacker with physical access to the system could use these flaws to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-3181, CVE-2014-3186, Moderate) * A memory corruption flaw was found in the way the USB ConnectTech WhiteHEAT serial driver processed completion commands sent via USB Request Blocks buffers. An attacker with physical access to the system could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-3185, Moderate) * A flaw was found in the way the Linux kernel's keys subsystem handled the termination condition in the associative array garbage collection functionality. A local, unprivileged user could use this flaw to crash the system. (CVE-2014-3631, Moderate) * Multiple flaws were found in the way the Linux kernel's ALSA implementation handled user controls. A local, privileged user could use either of these flaws to crash the system. (CVE-2014-4654, CVE-2014-4655, CVE-2014-4656, Moderate) * A flaw was found in the way the Linux kernel's VFS subsystem handled reference counting when performing unmount operations on symbolic links. A local, unprivileged user could use this flaw to exhaust all available memory on the system or, potentially, trigger a use-after-free error, resulting in a system crash or privilege escalation. (CVE-2014-5045, Moderate) * A flaw was found in the way the get_dumpable() function return value was interpreted in the ptrace subsystem of the Linux kernel. When 'fs.suid_dumpable' was set to 2, a local, unprivileged local user could use this flaw to bypass intended ptrace restrictions and obtain potentially sensitive information. (CVE-2013-2929, Low) * A stack overflow flaw caused by infinite recursion was found in the way the Linux kernel's UDF file system implementation processed indirect ICBs. An attacker with physical access to the system could use a specially crafted UDF image to crash the system. (CVE-2014-6410, Low) * An information leak flaw in the way the Linux kernel handled media device enumerate entities IOCTL requests could allow a local user able to access the /dev/media0 device file to leak kernel memory bytes. (CVE-2014-1739, Low) * An out-of-bounds read flaw in the Logitech Unifying receiver driver could allow an attacker with physical access to the system to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-3182, Low) * Multiple out-of-bounds write flaws were found in the way the Cherry Cymotion keyboard driver, KYE/Genius device drivers, Logitech device drivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote control driver, and Sunplus wireless desktop driver handled invalid HID reports. An attacker with physical access to the system could use either of these flaws to write data past an allocated memory buffer. (CVE-2014-3184, Low) * An information leak flaw was found in the RAM Disks Memory Copy (rd_mcp) back end driver of the iSCSI Target subsystem could allow a privileged user to leak the contents of kernel memory to an iSCSI initiator remote client. (CVE-2014-4027, Low) * An information leak flaw in the Linux kernel's ALSA implementation could allow a local, privileged user to leak kernel memory to user space. (CVE-2014-4652, Low) | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1971 CESA-2014:1971 CVE-2013-2929 CVE-2014-1739 CVE-2014-3181 CVE-2014-3182 CVE-2014-3184 CVE-2014-3185 CVE-2014-3186 CVE-2014-3631 CVE-2014-3673 CVE-2014-3687 CVE-2014-3688 CVE-2014-4027 CVE-2014-4652 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-5045 CVE-2014-6410 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 7 CentOS Linux 7 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28418 | |||
Oval ID: | oval:org.mitre.oval:def:28418 | ||
Title: | ELSA-2014-1971 -- kernel security and bug fix update (important) | ||
Description: | [3.10.0-123.13.1] - Oracle Linux certificates (Alexey Petrenko) [3.10.0-123.13.1] - [powerpc] mm: Make sure a local_irq_disable prevent a parallel THP split (Don Zickus) [1151057 1083296] - [powerpc] Implement __get_user_pages_fast() (Don Zickus) [1151057 1083296] - [scsi] vmw_pvscsi: Some improvements in pvscsi driver (Ewan Milne) [1144016 1075090] - [scsi] vmw_pvscsi: Add support for I/O requests coalescing (Ewan Milne) [1144016 1075090] - [scsi] vmw_pvscsi: Fix pvscsi_abort() function (Ewan Milne) [1144016 1075090] [3.10.0-123.12.1] - [alsa] control: Make sure that id->index does not overflow (Jaroslav Kysela) [1117313 1117314] {CVE-2014-4656} - [alsa] control: Handle numid overflow (Jaroslav Kysela) [1117313 1117314] {CVE-2014-4656} - [alsa] control: Protect user controls against concurrent access (Jaroslav Kysela) [1117338 1117339] {CVE-2014-4652} - [alsa] control: Fix replacing user controls (Jaroslav Kysela) [1117323 1117324] {CVE-2014-4654 CVE-2014-4655} - [net] sctp: fix remote memory pressure from excessive queueing (Daniel Borkmann) [1155750 1152755] {CVE-2014-3688} - [net] sctp: fix panic on duplicate ASCONF chunks (Daniel Borkmann) [1155737 1152755] {CVE-2014-3687} - [net] sctp: fix skb_over_panic when receiving malformed ASCONF chunks (Daniel Borkmann) [1147856 1152755] {CVE-2014-3673} - [net] sctp: handle association restarts when the socket is closed (Daniel Borkmann) [1147856 1152755] [1155737 1152755] [1155750 1152755] - [pci] Add ACS quirk for Intel 10G NICs (Alex Williamson) [1156447 1141399] - [pci] Add ACS quirk for Solarflare SFC9120 & SFC9140 (Alex Williamson) [1158316 1131552] - [lib] assoc_array: Fix termination condition in assoc array garbage collection (David Howells) [1155136 1139431] {CVE-2014-3631} - [block] cfq-iosched: Add comments on update timing of weight (Vivek Goyal) [1152874 1116126] - [block] cfq-iosched: Fix wrong children_weight calculation (Vivek Goyal) [1152874 1116126] - [powerpc] mm: Check paca psize is up to date for huge mappings (Gustavo Duarte) [1151927 1107337] - [x86] perf/intel: ignore CondChgd bit to avoid false NMI handling (Don Zickus) [1146819 1110264] - [x86] smpboot: initialize secondary CPU only if master CPU will wait for it (Phillip Lougher) [1144295 968147] - [x86] smpboot: Log error on secondary CPU wakeup failure at ERR level (Igor Mammedov) [1144295 968147] - [x86] smpboot: Fix list/memory corruption on CPU hotplug (Igor Mammedov) [1144295 968147] - [acpi] processor: do not mark present at boot but not onlined CPU as onlined (Igor Mammedov) [1144295 968147] - [fs] udf: Avoid infinite loop when processing indirect ICBs (Jacob Tanenbaum) [1142321 1142322] {CVE-2014-6410} - [hid] picolcd: fix memory corruption via OOB write (Jacob Tanenbaum) [1141408 1141409] {CVE-2014-3186} - [usb] serial/whiteheat: fix memory corruption flaw (Jacob Tanenbaum) [1141403 1141404] {CVE-2014-3185} - [hid] fix off by one error in various _report_fixup routines (Jacob Tanenbaum) [1141393 1141394] {CVE-2014-3184} - [hid] logitech-dj: fix OOB array access (Jacob Tanenbaum) [1141211 1141212] {CVE-2014-3182} - [hid] fix OOB write in magicmouse driver (Jacob Tanenbaum) [1141176 1141177] {CVE-2014-3181} - [acpi] Fix bug when ACPI reset register is implemented in system memory (Nigel Croxon) [1136525 1109971] - [fs] vfs: fix ref count leak in path_mountpoint() (Ian Kent) [1122481 1122376] {CVE-2014-5045} - [kernel] ptrace: get_dumpable() incorrect tests (Jacob Tanenbaum) [1111605 1111606] {CVE-2013-2929} - [media] media-device: fix an information leakage (Jacob Tanenbaum) [1109776 1109777] {CVE-2014-1739} - [target] rd: Refactor rd_build_device_space + rd_release_device_space (Denys Vlasenko) [1108754 1108755] {CVE-2014-4027} - [block] blkcg: fix use-after-free in __blkg_release_rcu() by making blkcg_gq refcnt an atomic_t (Vivek Goyal) [1158313 1118436] - [virt] kvm: fix PIT timer race condition (Petr Matousek) [1144879 1144880] {CVE-2014-3611} - [virt] kvm/vmx: handle invept and invvpid vm exits gracefully (Petr Matousek) [1145449 1116936] [1144828 1144829] {CVE-2014-3645 CVE-2014-3646} [3.10.0-123.11.1] - [net] fix UDP tunnel GSO of frag_list GRO packets (Phillip Lougher) [1149661 1119392] [3.10.0-123.10.1] - [pci] hotplug: Prevent NULL dereference during pciehp probe (Myron Stowe) [1142393 1133107] - [kernel] workqueue: apply __WQ_ORDERED to create_singlethread_workqueue() (Tomas Henzl) [1151314 1131563] | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1971 CVE-2013-2929 CVE-2014-4654 CVE-2014-4655 CVE-2014-5045 CVE-2014-3185 CVE-2014-3181 CVE-2014-3687 CVE-2014-3673 CVE-2014-3184 CVE-2014-1739 CVE-2014-3182 CVE-2014-3186 CVE-2014-3631 CVE-2014-3688 CVE-2014-4027 CVE-2014-4652 CVE-2014-4656 CVE-2014-6410 | Version: | 3 |
Platform(s): | Oracle Linux 7 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28482 | |||
Oval ID: | oval:org.mitre.oval:def:28482 | ||
Title: | ELSA-2014-3104 -- Unbreakable Enterprise kernel security update (important) | ||
Description: | [2.6.39-400.215.14] - HID: magicmouse: sanity check report size in raw_event() callback (Jiri Kosina) [Orabug: 19849355] {CVE-2014-3181} - ALSA: control: Protect user controls against concurrent access (Lars-Peter Clausen) [Orabug: 20192542] {CVE-2014-4652} - target/rd: Refactor rd_build_device_space + rd_release_device_space (Nicholas Bellinger) [Orabug: 20192517] {CVE-2014-4027} - media-device: fix infoleak in ioctl media_enum_entities() (Salva Peiro) [Orabug: 20192501] {CVE-2014-1739} {CVE-2014-1739} - udf: Avoid infinite loop when processing indirect ICBs (Jan Kara) [Orabug: 20192449] {CVE-2014-6410} - ALSA: control: Make sure that id->index does not overflow (Lars-Peter Clausen) [Orabug: 20192418] {CVE-2014-4656} - ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug: 20192376] {CVE-2014-465} - HID: picolcd: sanity check report size in raw_event() callback (Jiri Kosina) [Orabug: 20192205] {CVE-2014-3186} - net: sctp: fix remote memory pressure from excessive queueing (Daniel Borkmann) [Orabug: 20192059] {CVE-2014-3688} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-3104 CVE-2014-3181 CVE-2014-1739 CVE-2014-3186 CVE-2014-3688 CVE-2014-4027 CVE-2014-4652 CVE-2014-4656 CVE-2014-6410 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | kernel-uek |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0057.nasl - Type : ACT_GATHER_INFO |
2016-06-20 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL41739114.nasl - Type : ACT_GATHER_INFO |
2015-07-30 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-1272.nasl - Type : ACT_GATHER_INFO |
2015-04-10 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0040.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-118.nasl - Type : ACT_GATHER_INFO |
2015-03-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-3012.nasl - Type : ACT_GATHER_INFO |
2015-03-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0290.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-793.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-791.nasl - Type : ACT_GATHER_INFO |
2014-12-18 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20141216_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-12-18 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1997.nasl - Type : ACT_GATHER_INFO |
2014-12-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1997.nasl - Type : ACT_GATHER_INFO |
2014-12-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1997.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3104.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20141209_kernel_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3105.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3103.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1971.nasl - Type : ACT_GATHER_INFO |
2014-12-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1971.nasl - Type : ACT_GATHER_INFO |
2014-12-10 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1971.nasl - Type : ACT_GATHER_INFO |
2014-10-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-bigsmp-201409-140924.nasl - Type : ACT_GATHER_INFO |
2014-10-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140924.nasl - Type : ACT_GATHER_INFO |
2014-10-22 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-201.nasl - Type : ACT_GATHER_INFO |
2014-10-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2379-1.nasl - Type : ACT_GATHER_INFO |
2014-10-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2378-1.nasl - Type : ACT_GATHER_INFO |
2014-10-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2376-1.nasl - Type : ACT_GATHER_INFO |
2014-10-11 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2375-1.nasl - Type : ACT_GATHER_INFO |
2014-10-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2374-1.nasl - Type : ACT_GATHER_INFO |
2014-10-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1318.nasl - Type : ACT_GATHER_INFO |
2014-09-30 | Name : The remote Fedora host is missing a security update. File : fedora_2014-11008.nasl - Type : ACT_GATHER_INFO |
2014-09-23 | Name : The remote Fedora host is missing a security update. File : fedora_2014-11097.nasl - Type : ACT_GATHER_INFO |
2014-09-22 | Name : The remote Fedora host is missing a security update. File : fedora_2014-11031.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:42:28 |
|
2024-10-23 01:28:26 |
|
2024-08-02 12:29:34 |
|
2024-08-02 01:08:47 |
|
2024-03-12 12:26:10 |
|
2024-02-02 01:28:42 |
|
2024-02-01 12:08:27 |
|
2023-12-29 01:25:14 |
|
2023-11-22 01:24:59 |
|
2023-11-07 21:45:19 |
|
2023-09-05 12:27:12 |
|
2023-09-05 01:08:20 |
|
2023-09-02 12:27:11 |
|
2023-09-02 01:08:28 |
|
2023-08-12 12:29:38 |
|
2023-08-12 01:07:57 |
|
2023-08-11 12:25:19 |
|
2023-08-11 01:08:09 |
|
2023-08-06 12:24:36 |
|
2023-08-06 01:07:56 |
|
2023-08-04 12:24:40 |
|
2023-08-04 01:08:00 |
|
2023-07-14 12:24:39 |
|
2023-07-14 01:07:58 |
|
2023-03-29 01:26:27 |
|
2023-03-28 12:08:19 |
|
2022-10-11 12:22:14 |
|
2022-10-11 01:08:07 |
|
2022-09-09 01:19:35 |
|
2022-03-11 01:18:19 |
|
2021-05-25 12:14:48 |
|
2021-05-04 12:33:20 |
|
2021-04-22 01:40:23 |
|
2020-08-11 12:11:24 |
|
2020-08-08 01:11:23 |
|
2020-08-07 12:11:33 |
|
2020-08-07 01:12:03 |
|
2020-08-01 12:11:23 |
|
2020-07-30 01:11:56 |
|
2020-05-23 01:53:00 |
|
2020-05-23 00:42:03 |
|
2019-01-25 12:06:29 |
|
2018-11-17 12:05:02 |
|
2018-10-30 12:07:06 |
|
2018-08-09 12:03:05 |
|
2018-04-25 12:05:53 |
|
2017-04-04 13:20:39 |
|
2017-03-22 12:01:00 |
|
2016-08-23 09:24:52 |
|
2016-08-12 12:01:39 |
|
2016-07-13 12:00:56 |
|
2016-06-30 21:38:43 |
|
2016-06-29 00:39:00 |
|
2016-06-21 13:28:24 |
|
2016-04-27 01:09:38 |
|
2015-07-31 13:28:42 |
|
2015-04-11 13:28:50 |
|
2015-03-27 13:28:31 |
|
2015-03-21 13:27:33 |
|
2015-03-14 13:25:35 |
|
2014-12-23 13:26:37 |
|
2014-12-19 13:24:34 |
|
2014-12-18 13:25:35 |
|
2014-12-16 13:25:23 |
|
2014-12-12 00:22:17 |
|
2014-12-11 13:25:06 |
|
2014-12-07 09:26:08 |
|
2014-11-05 13:29:15 |
|
2014-10-24 13:27:24 |
|
2014-10-24 13:25:32 |
|
2014-10-23 13:24:56 |
|
2014-10-12 13:27:28 |
|
2014-10-04 13:31:45 |
|
2014-10-02 13:27:17 |
|
2014-10-01 13:27:25 |
|
2014-09-30 00:24:41 |
|
2014-09-28 17:24:39 |
|