[ { "id": 400864585, "name": "CVE-2021-24741", "full_name": "itsjeffersonli\/CVE-2021-24741", "owner": { "login": "itsjeffersonli", "id": 53053198, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53053198?v=4", "html_url": "https:\/\/github.com\/itsjeffersonli" }, "html_url": "https:\/\/github.com\/itsjeffersonli\/CVE-2021-24741", "description": "Multiple SQL Injection Vulnerability in Support Board Version 3.3.3 that allow remote unauthenticated attacker to execute arbitrary SQL commands via status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id parameters to ajax.php which is connected to functions.php which the vulnerability is present.", "fork": false, "created_at": "2021-08-28T18:34:40Z", "updated_at": "2021-09-20T16:55:55Z", "pushed_at": "2021-09-20T16:55:44Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "forks": 0, "watchers": 0, "score": 0 } ]