Due to improper sanitization of user input, a number of methods are vulnerable to SQL injection if used with user input that has not been sanitized by the caller.
{ "review_status": "REVIEWED", "url": "https://pkg.go.dev/vuln/GO-2020-0021" }
{ "imports": [ { "path": "github.com/gogits/gogs", "symbols": [ "GetIssues", "SearchRepositoryByName", "SearchUserByName" ] } ] }