6.9

CVSS4.0

CVE-2026-33042 - Parse Server affected by empty authData bypassing credential requirement on signup

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.29 and 8.6.49, a user can sign up without providing credentials by sending an empty `authData` object, bypassing the username and password requirement. This allows the creatiโ€ฆ

๐Ÿ“… Published: March 18, 2026, 9:54 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:51 a.m.

8.7

CVSS4.0

CVE-2026-32944 - Parse Server crash via deeply nested query condition operators

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.21 and 8.6.45, an unauthenticated attacker can crash the Parse Server process by sending a single request with deeply nested query condition operators. This terminates the seโ€ฆ

๐Ÿ“… Published: March 18, 2026, 9:50 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:51 a.m.

2.3

CVSS4.0

CVE-2026-32943 - Parse Server has a password reset token single-use bypass via concurrent requests

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.28 and 8.6.48, the password reset mechanism does not enforce single-use guarantees for reset tokens. When a user requests a password reset, the generated token can be consumeโ€ฆ

๐Ÿ“… Published: March 18, 2026, 9:46 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:52 a.m.

2.1

CVSS4.0

CVE-2026-4407 - Out-of-bounds array write in Xpdf 4.06 due to missing validation

Out-of-bounds array write in Xpdf 4.06 and earlier, due to incorrect validation of the "N" field in ICCBased color spaces.

๐Ÿ“… Published: March 18, 2026, 9:44 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:52 a.m.

8.2

CVSS4.0

CVE-2026-32886 - Parse Server's Cloud function dispatch crashes server via prototype chain traversal

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.24 and 8.6.47, remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted function name that traverses the JavaScript prototype chaโ€ฆ

๐Ÿ“… Published: March 18, 2026, 9:42 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:52 a.m.

5.3

CVSS4.0

CVE-2026-32878 - Parse Server vulnerable to schema poisoning via prototype pollution in deep copy

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.20 and 8.6.44, an attacker can bypass the default request keyword denylist protection and the class-level permission for adding fields by sending a crafted request that exploโ€ฆ

๐Ÿ“… Published: March 18, 2026, 9:40 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:52 a.m.

5.9

CVSS3.1

CVE-2026-32770 - Parse Server: LiveQuery subscription with invalid regular expression crashes server

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.19 and 8.6.43, a remote attacker can crash the Parse Server by subscribing to a LiveQuery with an invalid regular expression pattern. The server process terminates when the iโ€ฆ

๐Ÿ“… Published: March 18, 2026, 9:37 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:52 a.m.

4.3

CVSS3.1

CVE-2026-32742 - Parse Server session creation endpoint allows overwriting server-generated session fields

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.17 and 8.6.42, an authenticated user can overwrite server-generated session fields (`sessionToken`, `expiresAt`, `createdWith`) when creating a session object via `POST /clasโ€ฆ

๐Ÿ“… Published: March 18, 2026, 9:33 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:52 a.m.

8.3

CVSS4.0

CVE-2026-32728 - Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XML extensiโ€ฆ

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.15 and 8.6.41, an attacker who is allowed to upload files can bypass the file extension filter by appending a MIME parameter (e.g. `;charset=utf-8`) to the `Content-Type` heaโ€ฆ

๐Ÿ“… Published: March 18, 2026, 9:31 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:52 a.m.

4.8

CVSS4.0

CVE-2026-32723 - SandboxJS timers have an execution-quota bypass (cross-sandbox currentTicks race)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.35, SandboxJS timers have an execution-quota bypass. A global tick state (`currentTicks.current`) is shared between sandboxes. Timer string handlers are compiled at execution time using that global tick state rather than the scheduling sandโ€ฆ

๐Ÿ“… Published: March 18, 2026, 9:27 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:52 a.m.
Total resulsts: 349182
Page 1058 of 34,919
ยซ previous page ยป next page
Filters