Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| parse-community | parse-server | < 8.6.57 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-33538 | Parse Server: Denial of service via unindexed database query for unconfigured auth provide | |
| CVE-2026-33323 | Parse Server: Email verification resend page leaks user existence | |
| CVE-2026-33429 | Parse Server: Protected field change detection oracle via LiveQuery watch parameter | |
| CVE-2026-33508 | Parse Server: LiveQuery subscription query depth bypass | |
| CVE-2026-33421 | Parse Server: LiveQuery bypasses CLP pointer permission enforcement | |
| CVE-2026-33498 | Parse Server: Query condition depth bypass via pre-validation transform pipeline | |
| CVE-2026-33409 | Parse Server: Auth provider validation bypass on login via partial authData | |
| CVE-2026-33539 | Parse Server: SQL injection via aggregate and distinct field names in PostgreSQL adapter | |
| CVE-2026-33624 | Parse Server: MFA recovery code single-use bypass via concurrent requests | |
| CVE-2026-33627 | Parse Server: Auth data exposed via /users/me endpoint |
No comments yet