Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| parse-community | parse-server | >= 9.0.0 < 9.6.0-alpha.7 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-31840 | Parse Server has a SQL injection via dot-notation field name in PostgreSQL | |
| CVE-2026-31856 | Parse Server has a SQL injection via `Increment` operation on nested object field in Postg | |
| CVE-2026-31872 | Parse Server has a protected fields bypass via dot-notation in query and sort | |
| CVE-2026-31871 | Parse Server has a SQL Injection via dot-notation sub-key name in `Increment` operation on | |
| CVE-2026-31868 | Parse Server has Stored XSS via file upload of HTML-renderable file types | |
| CVE-2026-32234 | Parse Server has a SQL injection via query field name when using PostgreSQL | |
| CVE-2026-32098 | Parse Server has a protected fields bypass via LiveQuery subscription WHERE clause | |
| CVE-2026-31901 | Parse Server has user enumeration via email verification endpoint |
No comments yet