| { | 
 |   "id": "GO-2023-1494", | 
 |   "published": "0001-01-01T00:00:00Z", | 
 |   "modified": "0001-01-01T00:00:00Z", | 
 |   "aliases": [ | 
 |     "CVE-2014-125064", | 
 |     "GHSA-g7mw-9pf9-p2pm" | 
 |   ], | 
 |   "details": "There is a potential for SQL injection through manipulation of the sqlStatement argument.", | 
 |   "affected": [ | 
 |     { | 
 |       "package": { | 
 |         "name": "github.com/elgs/gosqljson", | 
 |         "ecosystem": "Go" | 
 |       }, | 
 |       "ranges": [ | 
 |         { | 
 |           "type": "SEMVER", | 
 |           "events": [ | 
 |             { | 
 |               "introduced": "0" | 
 |             }, | 
 |             { | 
 |               "fixed": "0.0.0-20220916234230-750f26ee23c7" | 
 |             } | 
 |           ] | 
 |         } | 
 |       ], | 
 |       "database_specific": { | 
 |         "url": "https://pkg.go.dev/vuln/GO-2023-1494" | 
 |       }, | 
 |       "ecosystem_specific": { | 
 |         "imports": [ | 
 |           { | 
 |             "path": "github.com/elgs/gosqljson", | 
 |             "symbols": [ | 
 |               "ExecDb", | 
 |               "QueryDbToArray", | 
 |               "QueryDbToArrayJson", | 
 |               "QueryDbToMap", | 
 |               "QueryDbToMapJson" | 
 |             ] | 
 |           } | 
 |         ] | 
 |       } | 
 |     } | 
 |   ], | 
 |   "references": [ | 
 |     { | 
 |       "type": "FIX", | 
 |       "url": "https://github.com/elgs/gosqljson/commit/2740b331546cb88eb61771df4c07d389e9f0363a" | 
 |     } | 
 |   ], | 
 |   "schema_version": "1.3.1" | 
 | } |