[ { "id": 710897618, "name": "CVE-2021-36393", "full_name": "StackOverflowExcept1on\/CVE-2021-36393", "owner": { "login": "StackOverflowExcept1on", "id": 109800286, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109800286?v=4", "html_url": "https:\/\/github.com\/StackOverflowExcept1on" }, "html_url": "https:\/\/github.com\/StackOverflowExcept1on\/CVE-2021-36393", "description": "Error-based blind SQL injection with bit-shifting approach for Moodle 3.10.4", "fork": false, "created_at": "2023-10-27T17:13:55Z", "updated_at": "2023-12-09T10:39:00Z", "pushed_at": "2023-12-09T10:36:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "moodle", "sql-injection", "vulnerability" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 714260511, "name": "CVE-2021-36393-Exploit", "full_name": "T0X1Cx\/CVE-2021-36393-Exploit", "owner": { "login": "T0X1Cx", "id": 71453093, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71453093?v=4", "html_url": "https:\/\/github.com\/T0X1Cx" }, "html_url": "https:\/\/github.com\/T0X1Cx\/CVE-2021-36393-Exploit", "description": "This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.", "fork": false, "created_at": "2023-11-04T11:45:55Z", "updated_at": "2023-12-03T18:20:35Z", "pushed_at": "2023-11-04T19:17:16Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 13, "score": 0, "subscribers_count": 2 } ]