[
    {
        "id": 400864585,
        "name": "CVE-2021-24741",
        "full_name": "dldygnl\/CVE-2021-24741",
        "owner": {
            "login": "dldygnl",
            "id": 53053198,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53053198?v=4",
            "html_url": "https:\/\/github.com\/dldygnl",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/dldygnl\/CVE-2021-24741",
        "description": "Multiple SQL Injection Vulnerability in Support Board Version 3.3.3 that allow remote unauthenticated attacker to execute arbitrary SQL commands via status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id parameters to ajax.php which is connected to functions.php which the vulnerability is present.",
        "fork": false,
        "created_at": "2021-08-28T18:34:40Z",
        "updated_at": "2023-04-24T02:39:18Z",
        "pushed_at": "2023-04-18T15:20:52Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve"
        ],
        "visibility": "public",
        "forks": 1,
        "watchers": 2,
        "score": 0,
        "subscribers_count": 1
    }
]