[ { "id": 400864585, "name": "CVE-2021-24741", "full_name": "dldygnl\/CVE-2021-24741", "owner": { "login": "dldygnl", "id": 53053198, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53053198?v=4", "html_url": "https:\/\/github.com\/dldygnl", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dldygnl\/CVE-2021-24741", "description": "Multiple SQL Injection Vulnerability in Support Board Version 3.3.3 that allow remote unauthenticated attacker to execute arbitrary SQL commands via status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id parameters to ajax.php which is connected to functions.php which the vulnerability is present.", "fork": false, "created_at": "2021-08-28T18:34:40Z", "updated_at": "2023-04-24T02:39:18Z", "pushed_at": "2023-04-18T15:20:52Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 } ]