2023-01-07 01:35:14 +01:00
[
{
2023-04-10 14:28:34 +02:00
"id" : 244965126 ,
2023-01-07 01:35:14 +01:00
"name" : "CVE-2019-20059" ,
2023-04-10 14:28:34 +02:00
"full_name" : "cve-vuln\/CVE-2019-20059" ,
2023-01-07 01:35:14 +01:00
"owner" : {
2023-04-10 14:28:34 +02:00
"login" : "cve-vuln" ,
"id" : 61799154 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/61799154?v=4" ,
"html_url" : "https:\/\/github.com\/cve-vuln"
2023-01-07 01:35:14 +01:00
} ,
2023-04-10 14:28:34 +02:00
"html_url" : "https:\/\/github.com\/cve-vuln\/CVE-2019-20059" ,
2023-01-07 01:35:14 +01:00
"description" : "Yetishare SQL Injection in sSortDir_0 parameter - v3.5.2 - v4.5.4. Apart from an admin being able to exploit this, it could also be used in a CSRF attack to trick an admin user into running malicious queries." ,
"fork" : false ,
2023-04-10 14:28:34 +02:00
"created_at" : "2020-03-04T17:41:52Z" ,
"updated_at" : "2020-03-04T17:41:55Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2020-02-07T17:48:22Z" ,
2023-04-10 14:28:34 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
2023-04-10 14:28:34 +02:00
"forks_count" : 2 ,
2023-01-07 01:35:14 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-04-10 14:28:34 +02:00
"forks" : 2 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 01:35:14 +01:00
}
]