diff --git a/2012/CVE-2012-4929.json b/2012/CVE-2012-4929.json index 49a53469be..0df4954845 100644 --- a/2012/CVE-2012-4929.json +++ b/2012/CVE-2012-4929.json @@ -13,13 +13,13 @@ "description": ":hocho: CRIME attack PoC : a compression oracle attacks CVE-2012-4929 :hocho:", "fork": false, "created_at": "2018-04-21T09:28:31Z", - "updated_at": "2020-06-30T15:54:55Z", + "updated_at": "2020-10-03T12:12:01Z", "pushed_at": "2019-03-23T10:53:09Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 8, "forks": 8, - "watchers": 19, + "watchers": 20, "score": 0 } ] \ No newline at end of file diff --git a/2013/CVE-2013-5211.json b/2013/CVE-2013-5211.json index 2d953c6c69..c8fed8e80a 100644 --- a/2013/CVE-2013-5211.json +++ b/2013/CVE-2013-5211.json @@ -36,13 +36,13 @@ "description": "NTP monlist scanner CVE-2013-5211", "fork": false, "created_at": "2014-12-14T18:58:26Z", - "updated_at": "2018-06-07T13:35:38Z", + "updated_at": "2020-10-03T10:23:06Z", "pushed_at": "2014-12-14T19:04:40Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index 2695bcf189..111487db2a 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -36,7 +36,7 @@ "description": "Python script for automatically protecting your systems against POODLE vulnerability (CVE-2014-3566)", "fork": false, "created_at": "2014-10-16T07:49:23Z", - "updated_at": "2018-07-15T08:46:05Z", + "updated_at": "2020-10-03T13:37:36Z", "pushed_at": "2014-10-20T14:28:52Z", "stargazers_count": 4, "watchers_count": 4, diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 45523976b5..d8d3eb709f 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-30T06:35:40Z", + "updated_at": "2020-10-03T14:26:02Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 709, - "watchers_count": 709, + "stargazers_count": 710, + "watchers_count": 710, "forks_count": 174, "forks": 174, - "watchers": 709, + "watchers": 710, "score": 0 }, { diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index 617ee33430..bfe16a3cd7 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -13,13 +13,13 @@ "description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)", "fork": false, "created_at": "2016-05-02T12:18:57Z", - "updated_at": "2020-09-27T05:43:57Z", + "updated_at": "2020-10-03T12:27:25Z", "pushed_at": "2019-08-13T07:14:01Z", - "stargazers_count": 95, - "watchers_count": 95, + "stargazers_count": 94, + "watchers_count": 94, "forks_count": 49, "forks": 49, - "watchers": 95, + "watchers": 94, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 1b0b2933f8..93ca53a947 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-30T06:35:40Z", + "updated_at": "2020-10-03T14:26:02Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 709, - "watchers_count": 709, + "stargazers_count": 710, + "watchers_count": 710, "forks_count": 174, "forks": 174, - "watchers": 709, + "watchers": 710, "score": 0 }, { diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index c360650b01..86dcb28224 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -381,7 +381,7 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2020-10-03T06:36:51Z", + "updated_at": "2020-10-03T11:57:35Z", "pushed_at": "2020-10-01T20:20:41Z", "stargazers_count": 226, "watchers_count": 226, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index b09b99a395..4df402bf33 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-30T06:35:40Z", + "updated_at": "2020-10-03T14:26:02Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 709, - "watchers_count": 709, + "stargazers_count": 710, + "watchers_count": 710, "forks_count": 174, "forks": 174, - "watchers": 709, + "watchers": 710, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-9805.json b/2017/CVE-2017-9805.json index d4db078a6a..c35c078953 100644 --- a/2017/CVE-2017-9805.json +++ b/2017/CVE-2017-9805.json @@ -13,13 +13,13 @@ "description": "CVE 2017-9805", "fork": false, "created_at": "2017-09-06T08:32:01Z", - "updated_at": "2020-09-23T06:38:31Z", + "updated_at": "2020-10-03T12:54:16Z", "pushed_at": "2020-08-31T04:34:29Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "forks_count": 28, "forks": 28, - "watchers": 51, + "watchers": 52, "score": 0 }, { diff --git a/2017/CVE-2017-9841.json b/2017/CVE-2017-9841.json index 2b6210a1c2..0bfafdc335 100644 --- a/2017/CVE-2017-9841.json +++ b/2017/CVE-2017-9841.json @@ -36,13 +36,13 @@ "description": "Tool to try multiple paths for PHPunit RCE CVE-2017-9841", "fork": false, "created_at": "2020-05-18T20:55:05Z", - "updated_at": "2020-08-18T23:02:26Z", + "updated_at": "2020-10-03T10:08:47Z", "pushed_at": "2020-07-27T12:40:39Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 5, "forks": 5, - "watchers": 14, + "watchers": 15, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index bbeb85f809..5836d8533d 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-30T06:35:40Z", + "updated_at": "2020-10-03T14:26:02Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 709, - "watchers_count": 709, + "stargazers_count": 710, + "watchers_count": 710, "forks_count": 174, "forks": 174, - "watchers": 709, + "watchers": 710, "score": 0 }, { diff --git a/2018/CVE-2018-4441.json b/2018/CVE-2018-4441.json index 8bce8c6087..ff5bd31bdc 100644 --- a/2018/CVE-2018-4441.json +++ b/2018/CVE-2018-4441.json @@ -17,8 +17,8 @@ "pushed_at": "2019-03-08T18:42:56Z", "stargazers_count": 199, "watchers_count": 199, - "forks_count": 56, - "forks": 56, + "forks_count": 55, + "forks": 55, "watchers": 199, "score": 0 } diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json index ce6d0099f6..f7d8336ab7 100644 --- a/2019/CVE-2019-1458.json +++ b/2019/CVE-2019-1458.json @@ -13,13 +13,13 @@ "description": "POC for cve-2019-1458", "fork": false, "created_at": "2020-03-03T17:55:07Z", - "updated_at": "2020-09-21T09:37:10Z", + "updated_at": "2020-10-03T09:27:16Z", "pushed_at": "2020-03-04T07:05:24Z", - "stargazers_count": 124, - "watchers_count": 124, + "stargazers_count": 125, + "watchers_count": 125, "forks_count": 50, "forks": 50, - "watchers": 124, + "watchers": 125, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index a994e4feed..e8b4005f31 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-10-03T04:00:24Z", + "updated_at": "2020-10-03T12:35:59Z", "pushed_at": "2020-10-03T04:00:20Z", - "stargazers_count": 1904, - "watchers_count": 1904, - "forks_count": 494, - "forks": 494, - "watchers": 1904, + "stargazers_count": 1905, + "watchers_count": 1905, + "forks_count": 495, + "forks": 495, + "watchers": 1905, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 3a59948f24..2c1741758e 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-30T06:35:40Z", + "updated_at": "2020-10-03T14:26:02Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 709, - "watchers_count": 709, + "stargazers_count": 710, + "watchers_count": 710, "forks_count": 174, "forks": 174, - "watchers": 709, + "watchers": 710, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 7c2e092e9c..f8e75e628b 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -13,7 +13,7 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2020-10-03T06:36:51Z", + "updated_at": "2020-10-03T11:57:35Z", "pushed_at": "2020-10-01T20:20:41Z", "stargazers_count": 226, "watchers_count": 226, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 398b926e8f..d69787089d 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1301,13 +1301,13 @@ "description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection", "fork": false, "created_at": "2020-06-10T16:44:39Z", - "updated_at": "2020-10-02T08:10:20Z", + "updated_at": "2020-10-03T11:19:27Z", "pushed_at": "2020-07-08T08:26:24Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "forks_count": 28, "forks": 28, - "watchers": 65, + "watchers": 66, "score": 0 }, { diff --git a/2020/CVE-2020-14064.json b/2020/CVE-2020-14064.json index 7364865916..9bbbd96c42 100644 --- a/2020/CVE-2020-14064.json +++ b/2020/CVE-2020-14064.json @@ -21,5 +21,28 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 300843760, + "name": "CVE-2020-14064", + "full_name": "masoud-zivari\/CVE-2020-14064", + "owner": { + "login": "masoud-zivari", + "id": 72297087, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/72297087?v=4", + "html_url": "https:\/\/github.com\/masoud-zivari" + }, + "html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14064", + "description": null, + "fork": false, + "created_at": "2020-10-03T09:30:34Z", + "updated_at": "2020-10-03T09:30:47Z", + "pushed_at": "2020-10-03T09:30:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14065.json b/2020/CVE-2020-14065.json index 78870f17db..2f171139fe 100644 --- a/2020/CVE-2020-14065.json +++ b/2020/CVE-2020-14065.json @@ -21,5 +21,28 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 300840687, + "name": "CVE-2020-14065", + "full_name": "masoud-zivari\/CVE-2020-14065", + "owner": { + "login": "masoud-zivari", + "id": 72297087, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/72297087?v=4", + "html_url": "https:\/\/github.com\/masoud-zivari" + }, + "html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14065", + "description": null, + "fork": false, + "created_at": "2020-10-03T09:13:19Z", + "updated_at": "2020-10-03T09:13:34Z", + "pushed_at": "2020-10-03T09:13:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14066.json b/2020/CVE-2020-14066.json index b7e344eccc..ea9e1b21ea 100644 --- a/2020/CVE-2020-14066.json +++ b/2020/CVE-2020-14066.json @@ -13,13 +13,36 @@ "description": null, "fork": false, "created_at": "2020-06-13T08:57:45Z", - "updated_at": "2020-07-27T08:27:33Z", - "pushed_at": "2020-07-27T08:27:31Z", + "updated_at": "2020-10-03T09:19:26Z", + "pushed_at": "2020-10-03T09:19:24Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 300841463, + "name": "CVE-2020-14066", + "full_name": "masoud-zivari\/CVE-2020-14066", + "owner": { + "login": "masoud-zivari", + "id": 72297087, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/72297087?v=4", + "html_url": "https:\/\/github.com\/masoud-zivari" + }, + "html_url": "https:\/\/github.com\/masoud-zivari\/CVE-2020-14066", + "description": null, + "fork": false, + "created_at": "2020-10-03T09:17:35Z", + "updated_at": "2020-10-03T09:17:50Z", + "pushed_at": "2020-10-03T09:17:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 45dc0d5ed8..e7803301dd 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2020-10-03T04:46:27Z", + "updated_at": "2020-10-03T12:36:43Z", "pushed_at": "2020-09-23T07:04:58Z", - "stargazers_count": 1096, - "watchers_count": 1096, + "stargazers_count": 1097, + "watchers_count": 1097, "forks_count": 231, "forks": 231, - "watchers": 1096, + "watchers": 1097, "score": 0 }, { @@ -128,13 +128,13 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2020-10-03T00:06:48Z", + "updated_at": "2020-10-03T09:33:19Z", "pushed_at": "2020-09-17T18:06:57Z", - "stargazers_count": 156, - "watchers_count": 156, + "stargazers_count": 157, + "watchers_count": 157, "forks_count": 53, "forks": 53, - "watchers": 156, + "watchers": 157, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.", "fork": false, "created_at": "2020-09-14T19:27:14Z", - "updated_at": "2020-10-02T19:12:46Z", + "updated_at": "2020-10-03T10:01:07Z", "pushed_at": "2020-09-16T14:05:27Z", - "stargazers_count": 107, - "watchers_count": 107, + "stargazers_count": 108, + "watchers_count": 108, "forks_count": 26, "forks": 26, - "watchers": 107, + "watchers": 108, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 8bca55875e..6a9af51983 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2020-09-30T06:35:40Z", + "updated_at": "2020-10-03T14:26:02Z", "pushed_at": "2020-09-02T16:21:12Z", - "stargazers_count": 709, - "watchers_count": 709, + "stargazers_count": 710, + "watchers_count": 710, "forks_count": 174, "forks": 174, - "watchers": 709, + "watchers": 710, "score": 0 }, { diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index f565bf5b6b..7d6fac7f4b 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2020-10-03T04:00:24Z", + "updated_at": "2020-10-03T12:35:59Z", "pushed_at": "2020-10-03T04:00:20Z", - "stargazers_count": 1904, - "watchers_count": 1904, - "forks_count": 494, - "forks": 494, - "watchers": 1904, + "stargazers_count": 1905, + "watchers_count": 1905, + "forks_count": 495, + "forks": 495, + "watchers": 1905, "score": 0 }, { diff --git a/README.md b/README.md index 25e0d9d45c..a1b78dceae 100644 --- a/README.md +++ b/README.md @@ -2008,6 +2008,7 @@ IceWarp Email Server 12.3.0.1 has Incorrect Access Control for user accounts. - [networksecure/CVE-2020-14064](https://github.com/networksecure/CVE-2020-14064) +- [masoud-zivari/CVE-2020-14064](https://github.com/masoud-zivari/CVE-2020-14064) ### CVE-2020-14065 @@ -2016,6 +2017,7 @@ IceWarp Email Server 12.3.0.1 allows remote attackers to upload files and consum - [networksecure/CVE-2020-14065](https://github.com/networksecure/CVE-2020-14065) +- [masoud-zivari/CVE-2020-14065](https://github.com/masoud-zivari/CVE-2020-14065) ### CVE-2020-14066 @@ -2024,6 +2026,7 @@ IceWarp Email Server 12.3.0.1 allows remote attackers to upload JavaScript files - [networksecure/CVE-2020-14066](https://github.com/networksecure/CVE-2020-14066) +- [masoud-zivari/CVE-2020-14066](https://github.com/masoud-zivari/CVE-2020-14066) ### CVE-2020-14195