2020-02-11 16:08:03 +01:00
|
|
|
|
[
|
|
|
|
|
{
|
|
|
|
|
"id": 239774776,
|
|
|
|
|
"name": "CVE-2020-7471",
|
|
|
|
|
"full_name": "Saferman\/CVE-2020-7471",
|
|
|
|
|
"owner": {
|
|
|
|
|
"login": "Saferman",
|
|
|
|
|
"id": 17509858,
|
|
|
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/17509858?v=4",
|
|
|
|
|
"html_url": "https:\/\/github.com\/Saferman"
|
|
|
|
|
},
|
|
|
|
|
"html_url": "https:\/\/github.com\/Saferman\/CVE-2020-7471",
|
|
|
|
|
"description": "django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
|
|
|
|
|
"fork": false,
|
|
|
|
|
"created_at": "2020-02-11T13:57:14Z",
|
2020-02-20 22:06:45 +01:00
|
|
|
|
"updated_at": "2020-02-20T15:13:25Z",
|
2020-02-13 16:07:45 +01:00
|
|
|
|
"pushed_at": "2020-02-13T12:56:31Z",
|
2020-02-20 22:06:45 +01:00
|
|
|
|
"stargazers_count": 51,
|
|
|
|
|
"watchers_count": 51,
|
|
|
|
|
"forks_count": 10,
|
|
|
|
|
"forks": 10,
|
|
|
|
|
"watchers": 51,
|
2020-02-13 10:07:27 +01:00
|
|
|
|
"score": 0
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"id": 240205875,
|
|
|
|
|
"name": "DjVul_StringAgg",
|
|
|
|
|
"full_name": "secoba\/DjVul_StringAgg",
|
|
|
|
|
"owner": {
|
|
|
|
|
"login": "secoba",
|
|
|
|
|
"id": 25523634,
|
|
|
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25523634?v=4",
|
|
|
|
|
"html_url": "https:\/\/github.com\/secoba"
|
|
|
|
|
},
|
|
|
|
|
"html_url": "https:\/\/github.com\/secoba\/DjVul_StringAgg",
|
|
|
|
|
"description": "Django StringAgg SQL Injection (CVE-2020-7471)",
|
|
|
|
|
"fork": false,
|
|
|
|
|
"created_at": "2020-02-13T07:55:44Z",
|
|
|
|
|
"updated_at": "2020-02-13T07:57:34Z",
|
|
|
|
|
"pushed_at": "2020-02-13T07:57:55Z",
|
|
|
|
|
"stargazers_count": 0,
|
|
|
|
|
"watchers_count": 0,
|
|
|
|
|
"forks_count": 0,
|
|
|
|
|
"forks": 0,
|
|
|
|
|
"watchers": 0,
|
2020-02-11 16:08:03 +01:00
|
|
|
|
"score": 0
|
|
|
|
|
}
|
|
|
|
|
]
|