2023-01-07 09:35:14 +09:00
[
{
"id" : 348890270 ,
"name" : "CVE-2019-20361-EXPLOIT" ,
"full_name" : "jerrylewis9\/CVE-2019-20361-EXPLOIT" ,
"owner" : {
"login" : "jerrylewis9" ,
"id" : 80862953 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/80862953?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/jerrylewis9" ,
"user_view_type" : "public"
2023-01-07 09:35:14 +09:00
} ,
"html_url" : "https:\/\/github.com\/jerrylewis9\/CVE-2019-20361-EXPLOIT" ,
"description" : "There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability)." ,
"fork" : false ,
"created_at" : "2021-03-18T00:22:05Z" ,
"updated_at" : "2021-03-18T14:22:00Z" ,
"pushed_at" : "2021-03-18T14:21:57Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 09:35:14 +09:00
}
]