Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| parse-community | parse-server | < 8.6.70 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-34373 | Parse Server: GraphQL API endpoint ignores CORS origin restriction | |
| CVE-2026-34573 | Parse Server: GraphQL complexity validator exponential fragment traversal DoS | |
| CVE-2026-34224 | Parse Server: MFA single-use token bypass via concurrent authData login requests | |
| CVE-2026-34784 | Parse Server: Streaming file download bypasses afterFind file trigger authorization | |
| CVE-2026-34532 | Parse Server: Cloud function validator bypass via prototype chain traversal | |
| CVE-2026-34215 | Parse Server: Auth data exposed via verify password endpoint | |
| CVE-2026-34574 | Parse Server: Session field immutability bypass via falsy-value guard | |
| CVE-2026-34363 | Parse Server: LiveQuery protected field leak via shared mutable state across concurrent su |
No comments yet