Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| parse-community | parse-server | >= 9.0.0, < 9.6.0-alpha.21 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32770 | 5.9 MEDIUM | Parse Server: LiveQuery subscription with invalid regular expression crashes server |
| CVE-2026-32742 | 4.3 MEDIUM | Parse Server session creation endpoint allows overwriting server-generated session fields |
| CVE-2026-32886 | Parse Server's Cloud function dispatch crashes server via prototype chain traversal | |
| CVE-2026-32728 | Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XM | |
| CVE-2026-32878 | Parse Server vulnerable to schema poisoning via prototype pollution in deep copy | |
| CVE-2026-32943 | Parse Server has a password reset token single-use bypass via concurrent requests | |
| CVE-2026-33042 | Parse Server affected by empty authData bypassing credential requirement on signup | |
| CVE-2026-33163 | Parse Server leaks protected fields via LiveQuery afterEvent trigger |
No comments yet