Auto Update 2021/11/29 06:13:04

This commit is contained in:
motikan2010-bot 2021-11-29 15:13:04 +09:00
parent 5bad3bc655
commit 43cca42316
27 changed files with 226 additions and 114 deletions

View file

@ -429,17 +429,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-11-28T11:15:49Z",
"updated_at": "2021-11-29T02:55:38Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 305,
"watchers_count": 305,
"stargazers_count": 307,
"watchers_count": 307,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 305,
"watchers": 307,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2021-11-24T12:37:42Z",
"updated_at": "2021-11-29T05:59:10Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 510,
"watchers_count": 510,
"stargazers_count": 511,
"watchers_count": 511,
"forks_count": 257,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 257,
"watchers": 510,
"watchers": 511,
"score": 0
},
{
@ -121,11 +121,11 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2021-11-23T15:41:32Z",
"updated_at": "2021-11-29T05:58:42Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 295,
"watchers_count": 295,
"forks_count": 89,
"stargazers_count": 296,
"watchers_count": 296,
"forks_count": 90,
"allow_forking": true,
"is_template": false,
"topics": [
@ -135,8 +135,8 @@
"shellcode"
],
"visibility": "public",
"forks": 89,
"watchers": 295,
"forks": 90,
"watchers": 296,
"score": 0
},
{

View file

@ -101,17 +101,17 @@
"description": "CVE-2018-13379 Script for Nmap NSE.",
"fork": false,
"created_at": "2019-10-14T04:09:44Z",
"updated_at": "2021-11-22T05:42:04Z",
"updated_at": "2021-11-29T01:56:15Z",
"pushed_at": "2020-09-09T05:06:05Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -2888,17 +2888,17 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2021-11-26T06:25:01Z",
"updated_at": "2021-11-29T01:41:31Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 241,
"watchers_count": 241,
"stargazers_count": 242,
"watchers_count": 242,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 241,
"watchers": 242,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-28T15:48:30Z",
"updated_at": "2021-11-29T02:16:53Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3010,
"watchers_count": 3010,
"stargazers_count": 3011,
"watchers_count": 3011,
"forks_count": 891,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 891,
"watchers": 3010,
"watchers": 3011,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "InfluxDB CVE-2019-20933 vulnerability exploit",
"fork": false,
"created_at": "2021-04-28T16:25:31Z",
"updated_at": "2021-11-12T13:02:44Z",
"updated_at": "2021-11-29T03:54:58Z",
"pushed_at": "2021-11-12T13:02:41Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-11-28T11:15:49Z",
"updated_at": "2021-11-29T02:55:38Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 305,
"watchers_count": 305,
"stargazers_count": 307,
"watchers_count": 307,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 305,
"watchers": 307,
"score": 0
},
{

View file

@ -55,6 +55,60 @@
},
{
"id": 432093732,
"name": "CVE-2020-0097-frameworks_ba",
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_ba",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_ba",
"description": null,
"fork": false,
"created_at": "2021-11-26T07:41:02Z",
"updated_at": "2021-11-29T03:11:58Z",
"pushed_at": "2021-11-26T07:43:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432889770,
"name": "CVE-2020-0097-frameworks_base_beforefix",
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_base_beforefix",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_base_beforefix",
"description": null,
"fork": false,
"created_at": "2021-11-29T03:12:16Z",
"updated_at": "2021-11-29T03:59:58Z",
"pushed_at": "2021-11-29T03:46:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432899300,
"name": "CVE-2020-0097-frameworks_base",
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_base",
"owner": {
@ -66,9 +120,9 @@
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_base",
"description": null,
"fork": false,
"created_at": "2021-11-26T07:41:02Z",
"updated_at": "2021-11-26T07:43:16Z",
"pushed_at": "2021-11-26T07:43:16Z",
"created_at": "2021-11-29T04:00:19Z",
"updated_at": "2021-11-29T04:38:04Z",
"pushed_at": "2021-11-29T04:38:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -136,6 +136,60 @@
},
{
"id": 432179578,
"name": "CVE-2020-0114-frameworks_basety",
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_basety",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_basety",
"description": null,
"fork": false,
"created_at": "2021-11-26T12:58:16Z",
"updated_at": "2021-11-29T01:36:41Z",
"pushed_at": "2021-11-26T13:06:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432870892,
"name": "CVE-2020-0114-frameworks_base_before",
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base_before",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base_before",
"description": null,
"fork": false,
"created_at": "2021-11-29T01:37:12Z",
"updated_at": "2021-11-29T02:24:08Z",
"pushed_at": "2021-11-29T02:07:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432880702,
"name": "CVE-2020-0114-frameworks_base",
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base",
"owner": {
@ -147,9 +201,9 @@
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base",
"description": null,
"fork": false,
"created_at": "2021-11-26T12:58:16Z",
"updated_at": "2021-11-26T13:06:23Z",
"pushed_at": "2021-11-26T13:06:20Z",
"created_at": "2021-11-29T02:27:53Z",
"updated_at": "2021-11-29T02:58:19Z",
"pushed_at": "2021-11-29T02:57:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -1045,10 +1045,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-11-19T08:40:33Z",
"updated_at": "2021-11-29T06:03:14Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1163,
"watchers_count": 1163,
"stargazers_count": 1162,
"watchers_count": 1162,
"forks_count": 366,
"allow_forking": true,
"is_template": false,
@ -1061,7 +1061,7 @@
],
"visibility": "public",
"forks": 366,
"watchers": 1163,
"watchers": 1162,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2020-09-17T21:25:18Z",
"updated_at": "2021-11-02T16:13:02Z",
"updated_at": "2021-11-29T02:30:40Z",
"pushed_at": "2020-09-18T00:01:00Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 41,
"watchers": 42,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-11-28T01:12:48Z",
"updated_at": "2021-11-29T02:37:51Z",
"pushed_at": "2021-11-10T19:56:38Z",
"stargazers_count": 1380,
"watchers_count": 1380,
"stargazers_count": 1383,
"watchers_count": 1383,
"forks_count": 311,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 311,
"watchers": 1380,
"watchers": 1383,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-28T15:48:30Z",
"updated_at": "2021-11-29T02:16:53Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3010,
"watchers_count": 3010,
"stargazers_count": 3011,
"watchers_count": 3011,
"forks_count": 891,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 891,
"watchers": 3010,
"watchers": 3011,
"score": 0
},
{

View file

@ -99,17 +99,17 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2021-11-28T09:00:45Z",
"updated_at": "2021-11-29T02:16:42Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 298,
"watchers_count": 298,
"stargazers_count": 300,
"watchers_count": 300,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 298,
"watchers": 300,
"score": 0
},
{

View file

@ -233,17 +233,17 @@
"description": "CVE-2021-22205 RCE ",
"fork": false,
"created_at": "2021-10-31T14:34:51Z",
"updated_at": "2021-11-28T05:24:11Z",
"pushed_at": "2021-10-31T15:40:34Z",
"stargazers_count": 6,
"watchers_count": 6,
"updated_at": "2021-11-29T02:21:48Z",
"pushed_at": "2021-11-29T01:58:10Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-11-27T00:38:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 1,
"score": 0
},
@ -40,17 +40,17 @@
"description": "CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day",
"fork": false,
"created_at": "2021-11-28T09:48:36Z",
"updated_at": "2021-11-28T17:07:15Z",
"updated_at": "2021-11-29T01:51:30Z",
"pushed_at": "2021-11-28T13:10:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -121,17 +121,17 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2021-11-27T11:06:16Z",
"updated_at": "2021-11-29T03:11:19Z",
"pushed_at": "2021-09-10T19:42:33Z",
"stargazers_count": 253,
"watchers_count": 253,
"stargazers_count": 254,
"watchers_count": 254,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 253,
"watchers": 254,
"score": 0
},
{

View file

@ -1081,12 +1081,12 @@
"pushed_at": "2021-11-16T04:00:14Z",
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 100,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-30807",
"fork": false,
"created_at": "2021-10-09T20:11:42Z",
"updated_at": "2021-11-29T00:07:19Z",
"updated_at": "2021-11-29T04:59:55Z",
"pushed_at": "2021-11-28T22:25:13Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"forks": 6,
"watchers": 18,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-10-18T06:40:48Z",
"updated_at": "2021-11-23T07:26:05Z",
"updated_at": "2021-11-29T05:01:58Z",
"pushed_at": "2021-11-23T07:26:03Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -45,17 +45,17 @@
"description": "Fix for the CVE-2021-36934",
"fork": false,
"created_at": "2021-07-21T13:06:51Z",
"updated_at": "2021-08-11T20:06:46Z",
"updated_at": "2021-11-29T00:31:18Z",
"pushed_at": "2021-10-15T23:44:37Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-11-23T18:33:19Z",
"updated_at": "2021-11-29T03:21:34Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 339,
"watchers_count": 339,
"stargazers_count": 340,
"watchers_count": 340,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 75,
"watchers": 339,
"watchers": 340,
"score": 0
},
{

View file

@ -10,13 +10,13 @@
"html_url": "https:\/\/github.com\/jonpalmisc"
},
"html_url": "https:\/\/github.com\/jonpalmisc\/CVE-2021-40531",
"description": "A demo of exploiting CVE-2021-40531, a vulnerability in Sketch.",
"description": "A demo exploiting CVE-2021-40531, a vulnerability in Sketch.",
"fork": false,
"created_at": "2021-11-19T17:38:34Z",
"updated_at": "2021-11-29T00:06:05Z",
"updated_at": "2021-11-29T02:38:38Z",
"pushed_at": "2021-11-22T14:52:04Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40865",
"fork": false,
"created_at": "2021-11-26T10:09:40Z",
"updated_at": "2021-11-28T23:43:31Z",
"updated_at": "2021-11-29T02:05:52Z",
"pushed_at": "2021-11-26T10:10:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 5,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Microsoft Exchange Server Poc",
"fork": false,
"created_at": "2021-11-23T02:26:26Z",
"updated_at": "2021-11-28T21:07:47Z",
"updated_at": "2021-11-29T02:15:27Z",
"pushed_at": "2021-11-23T02:33:47Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 14,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 34,
"forks": 15,
"watchers": 35,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Local PoC exploit for CVE-2021-43267 (Linux TIPC)",
"fork": false,
"created_at": "2021-11-26T01:51:57Z",
"updated_at": "2021-11-28T01:12:42Z",
"updated_at": "2021-11-29T03:09:04Z",
"pushed_at": "2021-11-28T01:12:40Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 12,
"score": 0
}
]

View file

@ -3599,6 +3599,8 @@ In various methods of PackageManagerService.java, there is a possible permission
- [Nivaskumark/CVE-2020-0097-frameworks_base_before](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_before)
- [Nivaskumark/CVE-2020-0097-frameworks_base_after](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_after)
- [Nivaskumark/CVE-2020-0097-frameworks_ba](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_ba)
- [Nivaskumark/CVE-2020-0097-frameworks_base_beforefix](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_beforefix)
- [Nivaskumark/CVE-2020-0097-frameworks_base](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base)
### CVE-2020-0108 (2020-08-11)
@ -3628,6 +3630,8 @@ In onCreateSliceProvider of KeyguardSliceProvider.java, there is a possible conf
- [Nivaskumark/CVE-2020-0114-frameworks_base11](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base11)
- [Nivaskumark/CVE-2020-0114-frameworks](https://github.com/Nivaskumark/CVE-2020-0114-frameworks)
- [Nivaskumark/CVE-2020-0114-frameworks_basegbdgb](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_basegbdgb)
- [Nivaskumark/CVE-2020-0114-frameworks_basety](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_basety)
- [Nivaskumark/CVE-2020-0114-frameworks_base_before](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base_before)
- [Nivaskumark/CVE-2020-0114-frameworks_base](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base)
### CVE-2020-0121 (2020-06-10)