Auto Update 2022/10/29 18:17:29

This commit is contained in:
motikan2010-bot 2022-10-30 03:17:29 +09:00
parent 1b3f9eb3bd
commit 6b11d4b3cd
26 changed files with 153 additions and 124 deletions

View file

@ -251,6 +251,34 @@
"watchers": 0,
"score": 0
},
{
"id": 217326730,
"name": "CVE-2015-7547-Research",
"full_name": "Stick-U235\/CVE-2015-7547-Research",
"owner": {
"login": "Stick-U235",
"id": 28267481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28267481?v=4",
"html_url": "https:\/\/github.com\/Stick-U235"
},
"html_url": "https:\/\/github.com\/Stick-U235\/CVE-2015-7547-Research",
"description": "CVE-2015-7547 initial research.",
"fork": false,
"created_at": "2019-10-24T15:02:23Z",
"updated_at": "2022-10-29T15:16:19Z",
"pushed_at": "2022-10-29T15:15:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263361814,
"name": "Glibc-Vulnerability-Exploit-CVE-2015-7547",

View file

@ -154,10 +154,10 @@
"fork": false,
"created_at": "2022-10-04T21:09:27Z",
"updated_at": "2022-10-29T01:32:35Z",
"pushed_at": "2022-10-29T02:01:31Z",
"pushed_at": "2022-10-29T17:51:51Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -168,7 +168,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 30,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "OpenEMR < 5.0.1.4 - (Authenticated) File upload - Remote command execution",
"fork": false,
"created_at": "2021-07-05T16:03:38Z",
"updated_at": "2021-10-17T04:32:56Z",
"updated_at": "2022-10-29T17:15:50Z",
"pushed_at": "2021-07-08T19:10:46Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -125,10 +125,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2022-10-25T18:46:58Z",
"updated_at": "2022-10-29T16:56:48Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 626,
"watchers_count": 626,
"stargazers_count": 627,
"watchers_count": 627,
"forks_count": 203,
"allow_forking": true,
"is_template": false,
@ -138,7 +138,7 @@
],
"visibility": "public",
"forks": 203,
"watchers": 626,
"watchers": 627,
"score": 0
},
{

View file

@ -42,7 +42,7 @@
"fork": false,
"created_at": "2020-03-28T22:09:39Z",
"updated_at": "2022-07-23T01:32:06Z",
"pushed_at": "2022-10-18T18:32:20Z",
"pushed_at": "2022-10-29T16:58:02Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 4,

View file

@ -97,10 +97,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2022-10-24T22:53:26Z",
"updated_at": "2022-10-29T16:31:48Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 960,
"watchers_count": 960,
"stargazers_count": 961,
"watchers_count": 961,
"forks_count": 270,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 270,
"watchers": 960,
"watchers": 961,
"score": 0
},
{

View file

@ -368,10 +368,10 @@
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
"fork": false,
"created_at": "2020-10-20T05:24:47Z",
"updated_at": "2021-10-10T21:13:40Z",
"updated_at": "2022-10-29T17:15:48Z",
"pushed_at": "2020-10-28T11:21:00Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -379,7 +379,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-7200: HPE Systems Insight Manager (SIM) RCE PoC",
"fork": false,
"created_at": "2021-01-14T21:05:29Z",
"updated_at": "2021-11-27T06:35:11Z",
"updated_at": "2022-10-29T17:15:49Z",
"pushed_at": "2021-01-17T20:30:38Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 5,
"score": 0
}
]

View file

@ -101,7 +101,7 @@
"pushed_at": "2021-11-16T17:34:11Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -122,7 +122,7 @@
"windows"
],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 29,
"score": 0
},

View file

@ -769,10 +769,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-10-29T07:47:24Z",
"updated_at": "2022-10-29T17:05:05Z",
"pushed_at": "2022-10-28T14:26:56Z",
"stargazers_count": 563,
"watchers_count": 563,
"stargazers_count": 564,
"watchers_count": 564,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
@ -787,7 +787,7 @@
],
"visibility": "public",
"forks": 60,
"watchers": 563,
"watchers": 564,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-03-02T19:07:37Z",
"updated_at": "2022-10-18T22:56:15Z",
"updated_at": "2022-10-29T17:33:42Z",
"pushed_at": "2022-03-08T15:37:34Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 83,
"watchers": 84,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Apache Log4j 远程代码执行",
"fork": false,
"created_at": "2021-12-09T15:27:38Z",
"updated_at": "2022-10-25T16:41:01Z",
"updated_at": "2022-10-29T15:08:28Z",
"pushed_at": "2022-07-25T20:41:30Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 37,
"watchers": 38,
"score": 0
},
{
@ -390,10 +390,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-10-27T07:09:26Z",
"updated_at": "2022-10-29T17:07:31Z",
"pushed_at": "2022-09-21T07:49:03Z",
"stargazers_count": 1486,
"watchers_count": 1486,
"stargazers_count": 1487,
"watchers_count": 1487,
"forks_count": 420,
"allow_forking": true,
"is_template": false,
@ -406,7 +406,7 @@
],
"visibility": "public",
"forks": 420,
"watchers": 1486,
"watchers": 1487,
"score": 0
},
{
@ -1325,10 +1325,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-10-29T06:46:28Z",
"updated_at": "2022-10-29T15:20:09Z",
"pushed_at": "2022-10-20T15:37:44Z",
"stargazers_count": 3086,
"watchers_count": 3086,
"stargazers_count": 3087,
"watchers_count": 3087,
"forks_count": 731,
"allow_forking": true,
"is_template": false,
@ -1336,7 +1336,7 @@
"topics": [],
"visibility": "public",
"forks": 731,
"watchers": 3086,
"watchers": 3087,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2022-02-14T06:23:06Z",
"updated_at": "2022-02-16T21:53:09Z",
"updated_at": "2022-10-29T15:58:17Z",
"pushed_at": "2022-02-14T06:23:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-22947",
"fork": false,
"created_at": "2022-03-02T11:58:55Z",
"updated_at": "2022-10-20T02:18:03Z",
"updated_at": "2022-10-29T13:45:07Z",
"pushed_at": "2022-03-03T14:03:30Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 190,
"watchers": 191,
"score": 0
},
{
@ -1538,10 +1538,10 @@
"description": "Spring Cloud Gateway远程代码执行",
"fork": false,
"created_at": "2022-10-29T03:28:55Z",
"updated_at": "2022-10-29T09:26:17Z",
"updated_at": "2022-10-29T16:45:01Z",
"pushed_at": "2022-10-29T04:34:21Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1549,7 +1549,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -688,10 +688,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-10-29T07:47:24Z",
"updated_at": "2022-10-29T17:05:05Z",
"pushed_at": "2022-10-28T14:26:56Z",
"stargazers_count": 563,
"watchers_count": 563,
"stargazers_count": 564,
"watchers_count": 564,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
@ -706,7 +706,7 @@
],
"visibility": "public",
"forks": 60,
"watchers": 563,
"watchers": 564,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-10-28T17:55:39Z",
"updated_at": "2022-10-29T14:18:33Z",
"pushed_at": "2022-10-27T16:35:08Z",
"stargazers_count": 362,
"watchers_count": 362,
"stargazers_count": 363,
"watchers_count": 363,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 362,
"watchers": 363,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-10-29T06:02:45Z",
"updated_at": "2022-10-29T13:39:01Z",
"pushed_at": "2022-09-29T05:09:10Z",
"stargazers_count": 841,
"watchers_count": 841,
"stargazers_count": 842,
"watchers_count": 842,
"forks_count": 147,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 147,
"watchers": 841,
"watchers": 842,
"score": 0
},
{
@ -311,10 +311,10 @@
"description": "[CVE-2022-26134]Confluence OGNL expression injected RCE with sandbox bypass.",
"fork": false,
"created_at": "2022-06-04T11:16:28Z",
"updated_at": "2022-10-26T03:36:45Z",
"updated_at": "2022-10-29T13:42:12Z",
"pushed_at": "2022-06-18T09:27:31Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -327,7 +327,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 27,
"watchers": 28,
"score": 0
},
{
@ -1111,10 +1111,10 @@
"description": "「💥」CVE-2022-26134 - Confluence Pre-Auth RCE",
"fork": false,
"created_at": "2022-06-19T13:50:22Z",
"updated_at": "2022-09-21T22:06:43Z",
"updated_at": "2022-10-29T13:43:31Z",
"pushed_at": "2022-06-19T14:08:28Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -1131,7 +1131,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 10,
"watchers": 11,
"score": 0
},
{
@ -1281,10 +1281,10 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)",
"fork": false,
"created_at": "2022-07-05T04:30:42Z",
"updated_at": "2022-09-10T14:31:50Z",
"updated_at": "2022-10-29T13:44:19Z",
"pushed_at": "2022-08-21T04:13:32Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -1297,7 +1297,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 8,
"watchers": 9,
"score": 0
},
{
@ -1491,10 +1491,10 @@
"description": "远程攻击者在Confluence未经身份验证的情况下可构造OGNL表达式进行注入实现在Confluence Server或Data Center上执行任意代码,在现有脚本上修改了poc方便getshell。",
"fork": false,
"created_at": "2022-07-23T14:38:11Z",
"updated_at": "2022-08-05T06:45:59Z",
"updated_at": "2022-10-29T13:45:18Z",
"pushed_at": "2022-07-25T05:51:13Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1505,7 +1505,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -276,10 +276,10 @@
"description": "A loader for zimbra 2022 rce (cve-2022-27925)",
"fork": false,
"created_at": "2022-10-01T10:33:55Z",
"updated_at": "2022-10-17T15:17:27Z",
"updated_at": "2022-10-29T12:31:31Z",
"pushed_at": "2022-10-25T14:20:58Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -293,7 +293,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": "Authenticated Remote Command Execution in Gitlab via GitHub import",
"fork": false,
"created_at": "2022-10-08T11:42:49Z",
"updated_at": "2022-10-26T08:38:23Z",
"updated_at": "2022-10-29T15:38:07Z",
"pushed_at": "2022-10-09T03:54:53Z",
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 28,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 178,
"forks": 29,
"watchers": 179,
"score": 0
},
{

View file

@ -43,10 +43,10 @@
"description": "Apache Spark Shell Command Injection Vulnerability",
"fork": false,
"created_at": "2022-07-19T18:52:12Z",
"updated_at": "2022-10-25T03:58:40Z",
"updated_at": "2022-10-29T13:28:26Z",
"pushed_at": "2022-09-07T18:12:27Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 74,
"watchers": 73,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-03T11:39:25Z",
"updated_at": "2022-10-29T09:50:45Z",
"updated_at": "2022-10-29T14:06:01Z",
"pushed_at": "2022-10-10T08:57:29Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

View file

@ -252,10 +252,10 @@
"description": "You can find a python script to exploit the vulnerability on Bitbucket related CVE-2022-36804.",
"fork": false,
"created_at": "2022-09-24T05:04:30Z",
"updated_at": "2022-10-25T02:28:57Z",
"updated_at": "2022-10-29T14:46:02Z",
"pushed_at": "2022-10-25T02:39:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -263,7 +263,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -313,10 +313,10 @@
"description": "A loader for bitbucket 2022 rce (cve-2022-36804)",
"fork": false,
"created_at": "2022-09-26T08:35:31Z",
"updated_at": "2022-10-25T10:33:34Z",
"updated_at": "2022-10-29T12:31:30Z",
"pushed_at": "2022-10-01T13:03:43Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -331,7 +331,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -277,13 +277,13 @@
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 263,
"watchers_count": 263,
"forks_count": 66,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 66,
"forks": 67,
"watchers": 263,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-41852 Proof of Concept (unofficial)",
"fork": false,
"created_at": "2022-10-14T12:09:19Z",
"updated_at": "2022-10-29T05:40:45Z",
"updated_at": "2022-10-29T14:41:06Z",
"pushed_at": "2022-10-20T08:01:38Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 54,
"watchers": 55,
"score": 0
}
]

View file

@ -232,7 +232,7 @@
"pushed_at": "2022-10-28T15:47:35Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -250,7 +250,7 @@
"security-tools"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 27,
"score": 0
},
@ -272,13 +272,13 @@
"pushed_at": "2022-10-20T12:51:08Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 36,
"score": 0
},
@ -362,13 +362,13 @@
"pushed_at": "2022-10-20T20:03:36Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 5,
"score": 0
},

View file

@ -26287,6 +26287,7 @@ Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functio
- [eSentire/cve-2015-7547-public](https://github.com/eSentire/cve-2015-7547-public)
- [bluebluelan/CVE-2015-7547-proj-master](https://github.com/bluebluelan/CVE-2015-7547-proj-master)
- [miracle03/CVE-2015-7547-master](https://github.com/miracle03/CVE-2015-7547-master)
- [Stick-U235/CVE-2015-7547-Research](https://github.com/Stick-U235/CVE-2015-7547-Research)
- [Amilaperera12/Glibc-Vulnerability-Exploit-CVE-2015-7547](https://github.com/Amilaperera12/Glibc-Vulnerability-Exploit-CVE-2015-7547)
### CVE-2015-7755 (2015-12-19)