<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent entries from github</title>
    <link>https://0.0.0.0:10001</link>
    <description>Contains only the most 10 recent entries.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 13 May 2026 18:25:17 +0000</lastBuildDate>
    <item>
      <title>ghsa-m2m6-cff5-3w7c</title>
      <link>https://0.0.0.0:10001/vuln/ghsa-m2m6-cff5-3w7c</link>
      <description>RedwoodSDK has Same-site CSRF through lack of origin validation in its server actions</description>
      <content:encoded>RedwoodSDK has Same-site CSRF through lack of origin validation in its server actions</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/ghsa-m2m6-cff5-3w7c</guid>
      <pubDate>Fri, 24 Apr 2026 15:36:52 +0000</pubDate>
    </item>
    <item>
      <title>ghsa-f5v4-2wr6-hqmg</title>
      <link>https://0.0.0.0:10001/vuln/ghsa-f5v4-2wr6-hqmg</link>
      <description>russh has pre-auth DoS via unbounded allocation in its keyboard-interactive auth handler</description>
      <content:encoded>russh has pre-auth DoS via unbounded allocation in its keyboard-interactive auth handler</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/ghsa-f5v4-2wr6-hqmg</guid>
      <pubDate>Fri, 24 Apr 2026 15:39:37 +0000</pubDate>
    </item>
    <item>
      <title>ghsa-mrxx-39g5-ph77</title>
      <link>https://0.0.0.0:10001/vuln/ghsa-mrxx-39g5-ph77</link>
      <description>Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in Upsert Condition Field</description>
      <content:encoded>Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in Upsert Condition Field</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/ghsa-mrxx-39g5-ph77</guid>
      <pubDate>Fri, 24 Apr 2026 15:41:21 +0000</pubDate>
    </item>
    <item>
      <title>ghsa-x92x-px7w-4gx4</title>
      <link>https://0.0.0.0:10001/vuln/ghsa-x92x-px7w-4gx4</link>
      <description>Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in NQuad Lang Field</description>
      <content:encoded>Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in NQuad Lang Field</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/ghsa-x92x-px7w-4gx4</guid>
      <pubDate>Fri, 24 Apr 2026 15:41:42 +0000</pubDate>
    </item>
    <item>
      <title>ghsa-xff3-5c9p-2mr4</title>
      <link>https://0.0.0.0:10001/vuln/ghsa-xff3-5c9p-2mr4</link>
      <description>New API: Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud</description>
      <content:encoded>New API: Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/ghsa-xff3-5c9p-2mr4</guid>
      <pubDate>Fri, 24 Apr 2026 15:43:25 +0000</pubDate>
    </item>
    <item>
      <title>ghsa-38c5-483c-4qqp</title>
      <link>https://0.0.0.0:10001/vuln/ghsa-38c5-483c-4qqp</link>
      <description>Grid: Integer Overflow in Grid::expand_rows Leads to Safe-API Undefined Behavior</description>
      <content:encoded>Grid: Integer Overflow in Grid::expand_rows Leads to Safe-API Undefined Behavior</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/ghsa-38c5-483c-4qqp</guid>
      <pubDate>Fri, 24 Apr 2026 15:57:36 +0000</pubDate>
    </item>
    <item>
      <title>ghsa-v638-38fc-rhfv</title>
      <link>https://0.0.0.0:10001/vuln/ghsa-v638-38fc-rhfv</link>
      <description>AWS Encryption SDK for Python: Key commitment policy bypass via shared key cache</description>
      <content:encoded>AWS Encryption SDK for Python: Key commitment policy bypass via shared key cache</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/ghsa-v638-38fc-rhfv</guid>
      <pubDate>Fri, 24 Apr 2026 15:59:17 +0000</pubDate>
    </item>
    <item>
      <title>ghsa-f5c8-m5vw-rmgq</title>
      <link>https://0.0.0.0:10001/vuln/ghsa-f5c8-m5vw-rmgq</link>
      <description>nova-toggle-5: Improper authorization on toggle endpoint allowed non-Nova users to modify boolean fields</description>
      <content:encoded>nova-toggle-5: Improper authorization on toggle endpoint allowed non-Nova users to modify boolean fields</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/ghsa-f5c8-m5vw-rmgq</guid>
      <pubDate>Fri, 24 Apr 2026 16:00:09 +0000</pubDate>
    </item>
    <item>
      <title>ghsa-xqmj-j6mv-4862</title>
      <link>https://0.0.0.0:10001/vuln/ghsa-xqmj-j6mv-4862</link>
      <description>LiteLLM: Server-Side Template Injection in /prompts/test endpoint</description>
      <content:encoded>LiteLLM: Server-Side Template Injection in /prompts/test endpoint</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/ghsa-xqmj-j6mv-4862</guid>
      <pubDate>Fri, 24 Apr 2026 16:02:42 +0000</pubDate>
    </item>
    <item>
      <title>ghsa-qc5p-3mg5-9fh8</title>
      <link>https://0.0.0.0:10001/vuln/ghsa-qc5p-3mg5-9fh8</link>
      <description>Avo: Broken Access Control Through Unauthorized Execution of Arbitrary Action Classes Across Resources</description>
      <content:encoded>Avo: Broken Access Control Through Unauthorized Execution of Arbitrary Action Classes Across Resources</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/ghsa-qc5p-3mg5-9fh8</guid>
      <pubDate>Fri, 24 Apr 2026 16:11:28 +0000</pubDate>
    </item>
  </channel>
</rss>
