Auto Update 2022/09/28 18:18:59

This commit is contained in:
motikan2010-bot 2022-09-29 03:18:59 +09:00
parent 54621e7fba
commit 322f5ba52f
32 changed files with 193 additions and 127 deletions

View file

@ -13,10 +13,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2022-09-16T11:36:47Z",
"updated_at": "2022-09-28T12:35:10Z",
"pushed_at": "2022-07-06T11:52:16Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 109,
"watchers": 110,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2022-09-17T06:57:03Z",
"updated_at": "2022-09-28T12:15:24Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 135,
"watchers": 136,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2017-04-14T04:55:51Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 7,
"score": 0
}

View file

@ -218,13 +218,13 @@
"pushed_at": "2017-12-28T07:16:15Z",
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 50,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 49,
"watchers": 84,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2022-09-10T11:05:37Z",
"updated_at": "2022-09-28T12:15:10Z",
"pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 125,
"watchers": 126,
"score": 0
},
{

View file

@ -45,13 +45,13 @@
"pushed_at": "2018-05-26T06:44:44Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 21,
"score": 0
},

View file

@ -111,7 +111,7 @@
"pushed_at": "2018-08-25T02:14:49Z",
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 51,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -123,7 +123,7 @@
"struts2"
],
"visibility": "public",
"forks": 51,
"forks": 52,
"watchers": 125,
"score": 0
},
@ -324,13 +324,13 @@
"pushed_at": "2018-08-30T00:16:01Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 53,
"score": 0
},

View file

@ -13,18 +13,18 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2022-09-20T16:23:17Z",
"updated_at": "2022-09-28T14:05:03Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 160,
"watchers_count": 160,
"forks_count": 51,
"stargazers_count": 161,
"watchers_count": 161,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 160,
"forks": 52,
"watchers": 161,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2022-09-15T02:05:48Z",
"updated_at": "2022-09-28T14:18:03Z",
"pushed_at": "2021-09-12T02:55:24Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 148,
"watchers": 149,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2022-09-17T06:57:03Z",
"updated_at": "2022-09-28T12:15:24Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 135,
"watchers": 136,
"score": 0
},
{

View file

@ -101,13 +101,13 @@
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 838,
"watchers_count": 838,
"forks_count": 174,
"forks_count": 173,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 174,
"forks": 173,
"watchers": 838,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2022-09-08T09:18:42Z",
"updated_at": "2022-09-28T12:26:41Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 621,
"watchers_count": 621,
"stargazers_count": 622,
"watchers_count": 622,
"forks_count": 157,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 157,
"watchers": 621,
"watchers": 622,
"score": 0
},
{

View file

@ -1054,10 +1054,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2022-09-27T16:12:01Z",
"updated_at": "2022-09-28T17:22:29Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1214,
"watchers_count": 1214,
"stargazers_count": 1215,
"watchers_count": 1215,
"forks_count": 375,
"allow_forking": true,
"is_template": false,
@ -1071,7 +1071,7 @@
],
"visibility": "public",
"forks": 375,
"watchers": 1214,
"watchers": 1215,
"score": 0
},
{
@ -1380,10 +1380,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2022-09-25T20:58:02Z",
"updated_at": "2022-09-28T17:16:53Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 474,
"watchers_count": 474,
"stargazers_count": 475,
"watchers_count": 475,
"forks_count": 154,
"allow_forking": true,
"is_template": false,
@ -1397,7 +1397,7 @@
],
"visibility": "public",
"forks": 154,
"watchers": 474,
"watchers": 475,
"score": 0
},
{
@ -1638,10 +1638,10 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2022-09-21T18:18:01Z",
"updated_at": "2022-09-28T12:54:37Z",
"pushed_at": "2022-03-30T14:02:04Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 194,
"watchers_count": 194,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
@ -1649,7 +1649,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 193,
"watchers": 194,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE",
"fork": false,
"created_at": "2022-02-10T21:52:24Z",
"updated_at": "2022-06-23T14:55:38Z",
"updated_at": "2022-09-28T14:01:50Z",
"pushed_at": "2022-08-15T18:13:20Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2022-09-28T12:20:51Z",
"updated_at": "2022-09-28T14:36:45Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 131,
"watchers": 132,
"score": 0
},
{

View file

@ -97,18 +97,18 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
"updated_at": "2022-09-27T21:55:52Z",
"updated_at": "2022-09-28T18:10:29Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 44,
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 250,
"forks": 45,
"watchers": 249,
"score": 0
},
{
@ -181,18 +181,18 @@
"description": "A test app to check if your device is vulnerable to CVE-2021-30955",
"fork": false,
"created_at": "2022-03-18T12:32:10Z",
"updated_at": "2022-09-27T15:02:34Z",
"updated_at": "2022-09-28T18:11:42Z",
"pushed_at": "2022-03-18T16:11:21Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 4,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 18,
"forks": 5,
"watchers": 17,
"score": 0
}
]

View file

@ -1860,13 +1860,13 @@
"pushed_at": "2022-04-19T12:33:32Z",
"stargazers_count": 317,
"watchers_count": 317,
"forks_count": 37,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 37,
"forks": 38,
"watchers": 317,
"score": 0
},

View file

@ -1810,10 +1810,10 @@
"description": "CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸",
"fork": false,
"created_at": "2022-06-04T08:31:32Z",
"updated_at": "2022-09-25T13:45:33Z",
"updated_at": "2022-09-28T13:41:53Z",
"pushed_at": "2022-06-16T17:14:10Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -1829,7 +1829,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -106,10 +106,10 @@
"description": "CVE-2022-1040",
"fork": false,
"created_at": "2022-09-25T15:15:01Z",
"updated_at": "2022-09-26T01:45:47Z",
"updated_at": "2022-09-28T15:32:00Z",
"pushed_at": "2022-09-25T15:15:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -117,7 +117,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -125,10 +125,10 @@
"description": "WordPress WP_Query SQL Injection POC",
"fork": false,
"created_at": "2022-07-28T13:12:51Z",
"updated_at": "2022-09-06T07:33:15Z",
"updated_at": "2022-09-28T14:33:55Z",
"pushed_at": "2022-07-30T08:20:53Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "A POC OF CVE-2022-2274 (openssl)",
"fork": false,
"created_at": "2022-09-24T21:30:34Z",
"updated_at": "2022-09-27T10:55:23Z",
"updated_at": "2022-09-28T14:55:07Z",
"pushed_at": "2022-09-24T21:37:16Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -525,10 +525,10 @@
"description": "SpringFramework 远程代码执行漏洞CVE-2022-22965",
"fork": false,
"created_at": "2022-04-01T04:51:44Z",
"updated_at": "2022-09-28T10:31:22Z",
"updated_at": "2022-09-28T15:37:10Z",
"pushed_at": "2022-04-01T12:08:45Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@ -536,7 +536,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 51,
"watchers": 54,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload",
"fork": false,
"created_at": "2022-09-01T04:36:50Z",
"updated_at": "2022-09-28T04:53:20Z",
"updated_at": "2022-09-28T15:01:36Z",
"pushed_at": "2022-09-02T11:00:28Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 63,
"watchers": 64,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-09-28T11:17:49Z",
"updated_at": "2022-09-28T18:18:04Z",
"pushed_at": "2022-09-24T16:43:58Z",
"stargazers_count": 288,
"watchers_count": 288,
"stargazers_count": 291,
"watchers_count": 291,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 288,
"watchers": 291,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-09-28T09:07:01Z",
"updated_at": "2022-09-28T13:59:03Z",
"pushed_at": "2022-08-29T12:54:56Z",
"stargazers_count": 785,
"watchers_count": 785,
"stargazers_count": 786,
"watchers_count": 786,
"forks_count": 141,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 141,
"watchers": 785,
"watchers": 786,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-09-26T04:52:12Z",
"updated_at": "2022-09-26T05:25:38Z",
"updated_at": "2022-09-28T15:02:24Z",
"pushed_at": "2022-09-26T05:23:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -10,23 +10,23 @@
"html_url": "https:\/\/github.com\/flux10n"
},
"html_url": "https:\/\/github.com\/flux10n\/CVE-2022-30190",
"description": "CVE-2022-30190",
"description": "CVE-2022-30190 (Exploit Microsoft)",
"fork": false,
"created_at": "2022-03-02T12:17:56Z",
"updated_at": "2022-09-28T12:10:51Z",
"pushed_at": "2022-09-28T12:11:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"updated_at": "2022-09-28T15:16:08Z",
"pushed_at": "2022-09-28T12:43:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"yeah"
"exploit-microsoft"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2022-09-26T07:26:22Z",
"updated_at": "2022-09-28T12:53:03Z",
"pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 165,
"watchers": 166,
"score": 0
},
{

View file

@ -213,10 +213,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2022-09-28T10:09:49Z",
"updated_at": "2022-09-28T17:06:59Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -228,7 +228,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 66,
"watchers": 67,
"score": 0
}
]

30
2022/CVE-2022-40490.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 542635261,
"name": "CVE-2022-40490",
"full_name": "whitej3rry\/CVE-2022-40490",
"owner": {
"login": "whitej3rry",
"id": 60222364,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60222364?v=4",
"html_url": "https:\/\/github.com\/whitej3rry"
},
"html_url": "https:\/\/github.com\/whitej3rry\/CVE-2022-40490",
"description": "Tiny File Manager v2.4.7 and below are vulnerable to Cross Site Scripting",
"fork": false,
"created_at": "2022-09-28T14:32:41Z",
"updated_at": "2022-09-28T14:32:42Z",
"pushed_at": "2022-09-28T14:37:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

30
2022/CVE-2022-40916.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 537484841,
"name": "CVE-2022-40916",
"full_name": "whitej3rry\/CVE-2022-40916",
"owner": {
"login": "whitej3rry",
"id": 60222364,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60222364?v=4",
"html_url": "https:\/\/github.com\/whitej3rry"
},
"html_url": "https:\/\/github.com\/whitej3rry\/CVE-2022-40916",
"description": null,
"fork": false,
"created_at": "2022-09-16T14:07:35Z",
"updated_at": "2022-09-28T14:29:21Z",
"pushed_at": "2022-09-28T14:37:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -3807,6 +3807,12 @@ OpenKM 6.3.11 allows stored XSS related to the javascript: substring i
- [izdiwho/CVE-2022-40317](https://github.com/izdiwho/CVE-2022-40317)
### CVE-2022-40490
- [whitej3rry/CVE-2022-40490](https://github.com/whitej3rry/CVE-2022-40490)
### CVE-2022-40916
- [whitej3rry/CVE-2022-40916](https://github.com/whitej3rry/CVE-2022-40916)
## 2021
### CVE-2021-0302 (2021-02-10)