[ { "id": 348890270, "name": "CVE-2019-20361-EXPLOIT", "full_name": "jerrylewis9\/CVE-2019-20361-EXPLOIT", "owner": { "login": "jerrylewis9", "id": 80862953, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80862953?v=4", "html_url": "https:\/\/github.com\/jerrylewis9", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jerrylewis9\/CVE-2019-20361-EXPLOIT", "description": "There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability).", "fork": false, "created_at": "2021-03-18T00:22:05Z", "updated_at": "2021-03-18T14:22:00Z", "pushed_at": "2021-03-18T14:21:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]