[ { "id": 400864585, "name": "CVE-2021-24741", "full_name": "itsjeffersonli\/CVE-2021-24741", "owner": { "login": "itsjeffersonli", "id": 53053198, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53053198?v=4", "html_url": "https:\/\/github.com\/itsjeffersonli" }, "html_url": "https:\/\/github.com\/itsjeffersonli\/CVE-2021-24741", "description": "Multiple SQL Injection Vulnerability in Support Board Version 3.3.3 that allow remote unauthenticated attacker to execute arbitrary SQL commands via status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id parameters to ajax.php which is connected to functions.php which the vulnerability is present.", "fork": false, "created_at": "2021-08-28T18:34:40Z", "updated_at": "2021-09-27T16:54:10Z", "pushed_at": "2021-09-27T16:54:08Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "cve" ], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 } ]