2021-03-18 04:09:15 +01:00
[
{
"id" : 348890270 ,
"name" : "CVE-2019-20361-EXPLOIT" ,
"full_name" : "jerrylewis9\/CVE-2019-20361-EXPLOIT" ,
"owner" : {
"login" : "jerrylewis9" ,
"id" : 80862953 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/80862953?v=4" ,
"html_url" : "https:\/\/github.com\/jerrylewis9"
} ,
"html_url" : "https:\/\/github.com\/jerrylewis9\/CVE-2019-20361-EXPLOIT" ,
"description" : "There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability)." ,
"fork" : false ,
"created_at" : "2021-03-18T00:22:05Z" ,
2021-03-18 16:09:27 +01:00
"updated_at" : "2021-03-18T14:22:00Z" ,
"pushed_at" : "2021-03-18T14:21:57Z" ,
2021-03-18 04:09:15 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-03-18 04:09:15 +01:00
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
}
]