Due to improper sanitization of user input, a number of methods are vulnerable to SQL injection if used with user input that has not been sanitized by the caller.
{ "url": "https://pkg.go.dev/vuln/GO-2020-0021", "review_status": "REVIEWED" }
{ "imports": [ { "path": "github.com/gogits/gogs", "symbols": [ "GetIssues", "SearchRepositoryByName", "SearchUserByName" ] } ] }