<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://0.0.0.0:10001/rss/recent/github/10</id>
  <title>Most recent entries from github</title>
  <updated>2026-05-13T17:02:59.697481+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://0.0.0.0:10001" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent entries.</subtitle>
  <entry>
    <id>https://0.0.0.0:10001/vuln/ghsa-m2m6-cff5-3w7c</id>
    <title>ghsa-m2m6-cff5-3w7c</title>
    <updated>2026-04-24T15:36:52+00:00</updated>
    <content>RedwoodSDK has Same-site CSRF through lack of origin validation in its server actions</content>
    <link href="https://0.0.0.0:10001/vuln/ghsa-m2m6-cff5-3w7c"/>
    <summary>RedwoodSDK has Same-site CSRF through lack of origin validation in its server actions</summary>
    <published>2026-04-24T15:36:52+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/ghsa-f5v4-2wr6-hqmg</id>
    <title>ghsa-f5v4-2wr6-hqmg</title>
    <updated>2026-04-24T15:39:37+00:00</updated>
    <content>russh has pre-auth DoS via unbounded allocation in its keyboard-interactive auth handler</content>
    <link href="https://0.0.0.0:10001/vuln/ghsa-f5v4-2wr6-hqmg"/>
    <summary>russh has pre-auth DoS via unbounded allocation in its keyboard-interactive auth handler</summary>
    <published>2026-04-24T15:39:37+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/ghsa-mrxx-39g5-ph77</id>
    <title>ghsa-mrxx-39g5-ph77</title>
    <updated>2026-04-24T15:41:21+00:00</updated>
    <content>Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in Upsert Condition Field</content>
    <link href="https://0.0.0.0:10001/vuln/ghsa-mrxx-39g5-ph77"/>
    <summary>Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in Upsert Condition Field</summary>
    <published>2026-04-24T15:41:21+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/ghsa-x92x-px7w-4gx4</id>
    <title>ghsa-x92x-px7w-4gx4</title>
    <updated>2026-04-24T15:41:42+00:00</updated>
    <content>Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in NQuad Lang Field</content>
    <link href="https://0.0.0.0:10001/vuln/ghsa-x92x-px7w-4gx4"/>
    <summary>Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in NQuad Lang Field</summary>
    <published>2026-04-24T15:41:42+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/ghsa-xff3-5c9p-2mr4</id>
    <title>ghsa-xff3-5c9p-2mr4</title>
    <updated>2026-04-24T15:43:25+00:00</updated>
    <content>New API: Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud</content>
    <link href="https://0.0.0.0:10001/vuln/ghsa-xff3-5c9p-2mr4"/>
    <summary>New API: Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud</summary>
    <published>2026-04-24T15:43:25+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/ghsa-38c5-483c-4qqp</id>
    <title>ghsa-38c5-483c-4qqp</title>
    <updated>2026-04-24T15:57:36+00:00</updated>
    <content>Grid: Integer Overflow in Grid::expand_rows Leads to Safe-API Undefined Behavior</content>
    <link href="https://0.0.0.0:10001/vuln/ghsa-38c5-483c-4qqp"/>
    <summary>Grid: Integer Overflow in Grid::expand_rows Leads to Safe-API Undefined Behavior</summary>
    <published>2026-04-24T15:57:36+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/ghsa-v638-38fc-rhfv</id>
    <title>ghsa-v638-38fc-rhfv</title>
    <updated>2026-04-24T15:59:17+00:00</updated>
    <content>AWS Encryption SDK for Python: Key commitment policy bypass via shared key cache</content>
    <link href="https://0.0.0.0:10001/vuln/ghsa-v638-38fc-rhfv"/>
    <summary>AWS Encryption SDK for Python: Key commitment policy bypass via shared key cache</summary>
    <published>2026-04-24T15:59:17+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/ghsa-f5c8-m5vw-rmgq</id>
    <title>ghsa-f5c8-m5vw-rmgq</title>
    <updated>2026-04-24T16:00:09+00:00</updated>
    <content>nova-toggle-5: Improper authorization on toggle endpoint allowed non-Nova users to modify boolean fields</content>
    <link href="https://0.0.0.0:10001/vuln/ghsa-f5c8-m5vw-rmgq"/>
    <summary>nova-toggle-5: Improper authorization on toggle endpoint allowed non-Nova users to modify boolean fields</summary>
    <published>2026-04-24T16:00:09+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/ghsa-xqmj-j6mv-4862</id>
    <title>ghsa-xqmj-j6mv-4862</title>
    <updated>2026-04-24T16:02:42+00:00</updated>
    <content>LiteLLM: Server-Side Template Injection in /prompts/test endpoint</content>
    <link href="https://0.0.0.0:10001/vuln/ghsa-xqmj-j6mv-4862"/>
    <summary>LiteLLM: Server-Side Template Injection in /prompts/test endpoint</summary>
    <published>2026-04-24T16:02:42+00:00</published>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/ghsa-qc5p-3mg5-9fh8</id>
    <title>ghsa-qc5p-3mg5-9fh8</title>
    <updated>2026-04-24T16:11:28+00:00</updated>
    <content>Avo: Broken Access Control Through Unauthorized Execution of Arbitrary Action Classes Across Resources</content>
    <link href="https://0.0.0.0:10001/vuln/ghsa-qc5p-3mg5-9fh8"/>
    <summary>Avo: Broken Access Control Through Unauthorized Execution of Arbitrary Action Classes Across Resources</summary>
    <published>2026-04-24T16:11:28+00:00</published>
  </entry>
</feed>
