mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/11/05 18:17:26
This commit is contained in:
parent
8fe833b036
commit
f595019c29
22 changed files with 148 additions and 78 deletions
|
@ -50,7 +50,7 @@
|
|||
"pushed_at": "2021-05-03T12:59:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -61,7 +61,7 @@
|
|||
"gitlab"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -237,10 +237,10 @@
|
|||
"description": "CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in \/src\/deliver.c may lead to remote command execution.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-27T01:03:11Z",
|
||||
"updated_at": "2021-12-05T21:57:04Z",
|
||||
"updated_at": "2022-11-05T17:31:55Z",
|
||||
"pushed_at": "2021-06-04T18:15:44Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -255,7 +255,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2022-11-04T22:30:21Z",
|
||||
"updated_at": "2022-11-05T14:53:28Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1512,
|
||||
"watchers_count": 1512,
|
||||
"stargazers_count": 1513,
|
||||
"watchers_count": 1513,
|
||||
"forks_count": 342,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 342,
|
||||
"watchers": 1512,
|
||||
"watchers": 1513,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "GLPI automatic exploitation tool for CVE-2020-15175",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-14T13:51:17Z",
|
||||
"updated_at": "2022-03-28T19:54:16Z",
|
||||
"updated_at": "2022-11-05T13:22:49Z",
|
||||
"pushed_at": "2022-06-20T11:05:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -97,10 +97,10 @@
|
|||
"description": "CVE-2020-8813 - RCE through graph_realtime.php in Cacti 1.2.8",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-30T11:23:52Z",
|
||||
"updated_at": "2022-11-04T19:50:16Z",
|
||||
"updated_at": "2022-11-05T14:33:56Z",
|
||||
"pushed_at": "2022-10-02T10:44:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-21T03:13:58Z",
|
||||
"updated_at": "2022-07-13T08:23:43Z",
|
||||
"updated_at": "2022-11-05T16:41:28Z",
|
||||
"pushed_at": "2021-05-21T03:24:25Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -878,10 +878,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-11-03T06:22:18Z",
|
||||
"updated_at": "2022-11-05T18:09:07Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 654,
|
||||
"watchers_count": 654,
|
||||
"stargazers_count": 656,
|
||||
"watchers_count": 656,
|
||||
"forks_count": 142,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -891,7 +891,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 142,
|
||||
"watchers": 654,
|
||||
"watchers": 656,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -491,7 +491,7 @@
|
|||
"pushed_at": "2022-10-31T07:06:38Z",
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"forks_count": 99,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -502,7 +502,7 @@
|
|||
"log4jshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"forks": 100,
|
||||
"watchers": 528,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Adobe Reader DC Information Leak Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T16:42:10Z",
|
||||
"updated_at": "2022-10-18T12:46:31Z",
|
||||
"updated_at": "2022-11-05T17:09:40Z",
|
||||
"pushed_at": "2022-10-13T17:00:50Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-14T06:23:06Z",
|
||||
"updated_at": "2022-10-29T15:58:17Z",
|
||||
"updated_at": "2022-11-05T15:57:52Z",
|
||||
"pushed_at": "2022-02-14T06:23:14Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-10-31T17:42:33Z",
|
||||
"updated_at": "2022-11-05T12:53:22Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 650,
|
||||
"watchers_count": 650,
|
||||
"stargazers_count": 651,
|
||||
"watchers_count": 651,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 140,
|
||||
"watchers": 650,
|
||||
"watchers": 651,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1262,13 +1262,13 @@
|
|||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 17,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"forks": 18,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2022-09-29T05:09:10Z",
|
||||
"stargazers_count": 852,
|
||||
"watchers_count": 852,
|
||||
"forks_count": 153,
|
||||
"forks_count": 152,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
"gui"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 153,
|
||||
"forks": 152,
|
||||
"watchers": 852,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022–30507 PoC ",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-16T15:55:28Z",
|
||||
"updated_at": "2022-09-27T04:17:09Z",
|
||||
"updated_at": "2022-11-05T13:54:08Z",
|
||||
"pushed_at": "2022-09-26T12:20:31Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,18 +13,18 @@
|
|||
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T18:38:01Z",
|
||||
"updated_at": "2022-11-05T11:58:17Z",
|
||||
"updated_at": "2022-11-05T18:08:59Z",
|
||||
"pushed_at": "2022-11-04T16:26:32Z",
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"forks_count": 28,
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 175,
|
||||
"forks": 30,
|
||||
"watchers": 193,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -181,10 +181,10 @@
|
|||
"description": "1-day case study",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-07T08:06:32Z",
|
||||
"updated_at": "2022-10-13T19:48:21Z",
|
||||
"updated_at": "2022-11-05T16:28:35Z",
|
||||
"pushed_at": "2022-10-30T15:29:25Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -192,7 +192,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-28T09:51:41Z",
|
||||
"updated_at": "2022-11-05T12:19:14Z",
|
||||
"updated_at": "2022-11-05T13:45:05Z",
|
||||
"pushed_at": "2022-11-05T10:13:33Z",
|
||||
"stargazers_count": 507,
|
||||
"watchers_count": 507,
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 507,
|
||||
"watchers": 508,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
30
2022/CVE-2022-36067.json
Normal file
30
2022/CVE-2022-36067.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 562153901,
|
||||
"name": "Exploit-For-CVE-2022-36067",
|
||||
"full_name": "Prathamrajgor\/Exploit-For-CVE-2022-36067",
|
||||
"owner": {
|
||||
"login": "Prathamrajgor",
|
||||
"id": 78405248,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78405248?v=4",
|
||||
"html_url": "https:\/\/github.com\/Prathamrajgor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Prathamrajgor\/Exploit-For-CVE-2022-36067",
|
||||
"description": "This repo contains payload for the CVE-2022-36067",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-05T13:28:27Z",
|
||||
"updated_at": "2022-11-05T13:38:08Z",
|
||||
"pushed_at": "2022-11-05T13:49:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -213,10 +213,10 @@
|
|||
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T08:58:21Z",
|
||||
"updated_at": "2022-11-05T10:19:59Z",
|
||||
"updated_at": "2022-11-05T13:09:53Z",
|
||||
"pushed_at": "2022-09-26T13:20:38Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -228,7 +228,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 153,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -247,10 +247,10 @@
|
|||
"description": "Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-15T16:51:25Z",
|
||||
"updated_at": "2022-10-25T21:19:52Z",
|
||||
"updated_at": "2022-11-05T13:15:29Z",
|
||||
"pushed_at": "2022-10-19T16:27:16Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -258,7 +258,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -275,10 +275,10 @@
|
|||
"description": "Exploit for CVE-2022-40684 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-15T17:02:49Z",
|
||||
"updated_at": "2022-10-20T09:29:55Z",
|
||||
"updated_at": "2022-11-05T13:15:15Z",
|
||||
"pushed_at": "2022-10-15T17:03:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -292,7 +292,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -228,10 +228,10 @@
|
|||
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-19T11:49:08Z",
|
||||
"updated_at": "2022-11-05T08:14:06Z",
|
||||
"updated_at": "2022-11-05T13:10:46Z",
|
||||
"pushed_at": "2022-11-02T09:45:33Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -251,7 +251,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -810,5 +810,36 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 562165502,
|
||||
"name": "cve-2022-42889-jmeter",
|
||||
"full_name": "QAInsights\/cve-2022-42889-jmeter",
|
||||
"owner": {
|
||||
"login": "QAInsights",
|
||||
"id": 2826376,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2826376?v=4",
|
||||
"html_url": "https:\/\/github.com\/QAInsights"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/QAInsights\/cve-2022-42889-jmeter",
|
||||
"description": "Script to handle CVE 2022-42889",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-05T14:08:18Z",
|
||||
"updated_at": "2022-11-05T14:21:15Z",
|
||||
"pushed_at": "2022-11-05T15:27:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-42889",
|
||||
"jmeter"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -3708,6 +3708,14 @@ There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSD
|
|||
- [xiaobaiakai/CVE-2022-35914](https://github.com/xiaobaiakai/CVE-2022-35914)
|
||||
- [6E6L6F/CVE-2022-35914](https://github.com/6E6L6F/CVE-2022-35914)
|
||||
|
||||
### CVE-2022-36067 (2022-09-06)
|
||||
|
||||
<code>
|
||||
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
|
||||
</code>
|
||||
|
||||
- [Prathamrajgor/Exploit-For-CVE-2022-36067](https://github.com/Prathamrajgor/Exploit-For-CVE-2022-36067)
|
||||
|
||||
### CVE-2022-36162
|
||||
- [MaherAzzouzi/CVE-2022-36162](https://github.com/MaherAzzouzi/CVE-2022-36162)
|
||||
|
||||
|
@ -4227,6 +4235,7 @@ Apache Commons Text performs variable interpolation, allowing properties to be d
|
|||
- [Hack4rLIFE/CVE-2022-42889](https://github.com/Hack4rLIFE/CVE-2022-42889)
|
||||
- [cryxnet/CVE-2022-42889-PoC](https://github.com/cryxnet/CVE-2022-42889-PoC)
|
||||
- [sunnyvale-it/CVE-2022-42889-PoC](https://github.com/sunnyvale-it/CVE-2022-42889-PoC)
|
||||
- [QAInsights/cve-2022-42889-jmeter](https://github.com/QAInsights/cve-2022-42889-jmeter)
|
||||
|
||||
### CVE-2022-42899 (2022-10-12)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue