Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| parse-community | parse-server | >= 9.0.0 < 9.5.2-alpha.7 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC

| CVE-2026-30939 | Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype | |
| CVE-2026-30941 | Parse Server has a NoSQL injection via token type in password reset and email verification | |
| CVE-2026-30938 | Parse Server has denylist `requestKeywordDenylist` keyword scan bypass through nested obje | |
| CVE-2026-30948 | Parse Server has stored cross-site scripting (XSS) via SVG file upload | |
| CVE-2026-30949 | Parse Server is missing audience validation in Keycloak authentication adapter | |
| CVE-2026-30946 | Parse Server affected by denial-of-service via unbounded query complexity in REST and Grap | |
| CVE-2026-30947 | Parse Server ha a bypass of class-level permissions in LiveQuery | |
| CVE-2026-31800 | Parse Server: Classes `_GraphQLConfig` and `_Audience` master key bypass via generic class | |
| CVE-2026-30972 | Parse Server has a rate limit bypass via batch request endpoint | |
| CVE-2026-30962 | Parse Server has a protected fields bypass via logical query operators | |
| CVE-2026-30967 | Parse Server OAuth2 authentication adapter account takeover via identity spoofing | |
| CVE-2026-30965 | Parse Server session token exfiltration via `redirectClassNameForKey` query parameter | |
| CVE-2026-31828 | Parse Server has an LDAP injection via unsanitized user input in DN and group filter const |
No comments yet