Filtered by vendor Parseplatform
Subscribe
Total
25 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-15270 | 1 Parseplatform | 1 Parse-server | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched. | |||||
CVE-2020-15126 | 1 Parseplatform | 1 Parse Server | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
In parser-server from version 3.5.0 and before 4.3.0, an authenticated user using the viewer GraphQL query can by pass all read security on his User object and can also by pass all objects linked via relation or Pointer on his User object. | |||||
CVE-2019-1020013 | 1 Parseplatform | 1 Parse-server | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
parse-server before 3.6.0 allows account enumeration. | |||||
CVE-2019-1020012 | 1 Parseplatform | 1 Parse-server | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
parse-server before 3.4.1 allows DoS after any POST to a volatile class. | |||||
CVE-2024-47183 | 1 Parseplatform | 1 Parse Server | 2024-11-13 | N/A | 8.1 HIGH |
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. If the Parse Server option allowCustomObjectId: true is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role. This vulnerability is fixed in 6.5.9 and 7.3.0. |