Skip to content

Commit a331f35

Browse files
1 parent 56e063a commit a331f35

7 files changed

Lines changed: 67 additions & 15 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-2299-ghjr-6vjp/GHSA-2299-ghjr-6vjp.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2299-ghjr-6vjp",
4-
"modified": "2026-03-24T19:48:25Z",
4+
"modified": "2026-03-27T21:54:30Z",
55
"published": "2026-03-24T19:48:24Z",
66
"aliases": [
77
"CVE-2026-33624"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-2299-ghjr-6vjp"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33624"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/parse-community/parse-server/pull/10275"
@@ -67,6 +71,14 @@
6771
"type": "WEB",
6872
"url": "https://github.com/parse-community/parse-server/pull/10276"
6973
},
74+
{
75+
"type": "WEB",
76+
"url": "https://github.com/parse-community/parse-server/commit/5e70094250a36bfcc14ecd49592be2b94fba66ff"
77+
},
78+
{
79+
"type": "WEB",
80+
"url": "https://github.com/parse-community/parse-server/commit/fc3da35a81d5083b453e8967cabcc880f1a3bd0c"
81+
},
7082
{
7183
"type": "PACKAGE",
7284
"url": "https://github.com/parse-community/parse-server"
@@ -79,6 +91,6 @@
7991
"severity": "LOW",
8092
"github_reviewed": true,
8193
"github_reviewed_at": "2026-03-24T19:48:24Z",
82-
"nvd_published_at": null
94+
"nvd_published_at": "2026-03-24T19:16:55Z"
8395
}
8496
}

advisories/github-reviewed/2026/03/GHSA-2qvq-rjwj-gvw9/GHSA-2qvq-rjwj-gvw9.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2qvq-rjwj-gvw9",
4-
"modified": "2026-03-26T22:20:51Z",
4+
"modified": "2026-03-27T21:52:02Z",
55
"published": "2026-03-26T22:20:51Z",
66
"aliases": [
77
"CVE-2026-33916"
@@ -48,6 +48,10 @@
4848
"type": "ADVISORY",
4949
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23383"
5050
},
51+
{
52+
"type": "ADVISORY",
53+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33916"
54+
},
5155
{
5256
"type": "WEB",
5357
"url": "https://github.com/handlebars-lang/handlebars.js/commit/68d8df5a88e0a26fe9e6084c5c6aaebe67b07da2"
@@ -69,6 +73,6 @@
6973
"severity": "MODERATE",
7074
"github_reviewed": true,
7175
"github_reviewed_at": "2026-03-26T22:20:51Z",
72-
"nvd_published_at": null
76+
"nvd_published_at": "2026-03-27T21:17:27Z"
7377
}
7478
}

advisories/github-reviewed/2026/03/GHSA-2w6w-674q-4c4q/GHSA-2w6w-674q-4c4q.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2w6w-674q-4c4q",
4-
"modified": "2026-03-27T18:19:58Z",
4+
"modified": "2026-03-27T21:52:17Z",
55
"published": "2026-03-27T18:19:58Z",
66
"aliases": [
77
"CVE-2026-33937"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/handlebars-lang/handlebars.js/security/advisories/GHSA-2w6w-674q-4c4q"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33937"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/handlebars-lang/handlebars.js/commit/68d8df5a88e0a26fe9e6084c5c6aaebe67b07da2"
@@ -64,6 +68,6 @@
6468
"severity": "CRITICAL",
6569
"github_reviewed": true,
6670
"github_reviewed_at": "2026-03-27T18:19:58Z",
67-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-27T21:17:27Z"
6872
}
6973
}

advisories/github-reviewed/2026/03/GHSA-3mfm-83xf-c92r/GHSA-3mfm-83xf-c92r.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3mfm-83xf-c92r",
4-
"modified": "2026-03-27T18:20:44Z",
4+
"modified": "2026-03-27T21:52:26Z",
55
"published": "2026-03-27T18:20:44Z",
66
"aliases": [
77
"CVE-2026-33938"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/handlebars-lang/handlebars.js/security/advisories/GHSA-3mfm-83xf-c92r"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33938"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/handlebars-lang/handlebars.js/commit/68d8df5a88e0a26fe9e6084c5c6aaebe67b07da2"
@@ -64,6 +68,6 @@
6468
"severity": "HIGH",
6569
"github_reviewed": true,
6670
"github_reviewed_at": "2026-03-27T18:20:44Z",
67-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-27T21:17:27Z"
6872
}
6973
}

advisories/github-reviewed/2026/03/GHSA-8c4j-f57c-35cf/GHSA-8c4j-f57c-35cf.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8c4j-f57c-35cf",
4-
"modified": "2026-03-27T19:36:23Z",
4+
"modified": "2026-03-27T21:52:39Z",
55
"published": "2026-03-27T19:36:23Z",
66
"aliases": [
77
"CVE-2026-34046"
@@ -65,6 +65,10 @@
6565
"type": "WEB",
6666
"url": "https://github.com/langflow-ai/langflow/security/advisories/GHSA-8c4j-f57c-35cf"
6767
},
68+
{
69+
"type": "ADVISORY",
70+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34046"
71+
},
6872
{
6973
"type": "WEB",
7074
"url": "https://github.com/langflow-ai/langflow/pull/8956"
@@ -82,6 +86,6 @@
8286
"severity": "HIGH",
8387
"github_reviewed": true,
8488
"github_reviewed_at": "2026-03-27T19:36:23Z",
85-
"nvd_published_at": null
89+
"nvd_published_at": "2026-03-27T21:17:27Z"
8690
}
8791
}

advisories/github-reviewed/2026/03/GHSA-g4cf-xj29-wqqr/GHSA-g4cf-xj29-wqqr.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g4cf-xj29-wqqr",
4-
"modified": "2026-03-24T19:11:40Z",
4+
"modified": "2026-03-27T21:53:45Z",
55
"published": "2026-03-24T19:11:40Z",
66
"aliases": [
77
"CVE-2026-33538"
88
],
99
"summary": "Parse Server: Denial of Service via unindexed database query for unconfigured auth providers",
10-
"details": "### Impact\n\nAn unauthenticated attacker can cause Denial of Service by sending authentication requests with arbitrary, unconfigured provider names. The server executes a database query for each unconfigured provider before rejecting the request, and since no database index exists for unconfigured providers, each request triggers a full collection scan on the user database. This can be parallelized to saturate database resources.\n\n### Patches\n\nThe fix validates that an authentication provider is configured before executing any database query. Requests with unconfigured providers are now rejected immediately without querying the database.\n\n### Workarounds\n\nThere is no known workaround other than upgrading.\n\n### Resources\n\n- GitHub security advisory: https://github.com/parse-community/parse-server/security/advisories/GHSA-g4cf-xj29-wqqr\n- Fix Parse Server 9: https://github.com/parse-community/parse-server/pull/10270\n- Fix Parse Server 8: https://github.com/parse-community/parse-server/pull/10271",
10+
"details": "### Impact\n\nAn unauthenticated attacker can cause Denial of Service by sending authentication requests with arbitrary, unconfigured provider names. The server executes a database query for each unconfigured provider before rejecting the request, and since no database index exists for unconfigured providers, each request triggers a full collection scan on the user database. This can be parallelized to saturate database resources.\n\n### Patches\n\nThe fix validates that an authentication provider is configured before executing any database query. Requests with unconfigured providers are now rejected immediately without querying the database.\n\n### Workarounds\n\nThere is no known workaround other than upgrading.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V4",
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-g4cf-xj29-wqqr"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33538"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/parse-community/parse-server/pull/10270"
@@ -67,6 +71,14 @@
6771
"type": "WEB",
6872
"url": "https://github.com/parse-community/parse-server/pull/10271"
6973
},
74+
{
75+
"type": "WEB",
76+
"url": "https://github.com/parse-community/parse-server/commit/40eb442e02672986730007d0a1edb22c1c4bd357"
77+
},
78+
{
79+
"type": "WEB",
80+
"url": "https://github.com/parse-community/parse-server/commit/fbac847499e57f243315c5fc7135be1d58bb8e54"
81+
},
7082
{
7183
"type": "PACKAGE",
7284
"url": "https://github.com/parse-community/parse-server"
@@ -79,6 +91,6 @@
7991
"severity": "HIGH",
8092
"github_reviewed": true,
8193
"github_reviewed_at": "2026-03-24T19:11:40Z",
82-
"nvd_published_at": null
94+
"nvd_published_at": "2026-03-24T19:16:54Z"
8395
}
8496
}

advisories/github-reviewed/2026/03/GHSA-p2w6-rmh7-w8q3/GHSA-p2w6-rmh7-w8q3.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p2w6-rmh7-w8q3",
4-
"modified": "2026-03-24T19:12:06Z",
4+
"modified": "2026-03-27T21:54:05Z",
55
"published": "2026-03-24T19:12:06Z",
66
"aliases": [
77
"CVE-2026-33539"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-p2w6-rmh7-w8q3"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33539"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/parse-community/parse-server/pull/10272"
@@ -67,6 +71,14 @@
6771
"type": "WEB",
6872
"url": "https://github.com/parse-community/parse-server/pull/10273"
6973
},
74+
{
75+
"type": "WEB",
76+
"url": "https://github.com/parse-community/parse-server/commit/03249f9bf5b8783c8b848f84dab791ff0b761b8c"
77+
},
78+
{
79+
"type": "WEB",
80+
"url": "https://github.com/parse-community/parse-server/commit/bdddab5f8b61a40cb8fc62dd895887bdd2f3838e"
81+
},
7082
{
7183
"type": "PACKAGE",
7284
"url": "https://github.com/parse-community/parse-server"
@@ -79,6 +91,6 @@
7991
"severity": "HIGH",
8092
"github_reviewed": true,
8193
"github_reviewed_at": "2026-03-24T19:12:06Z",
82-
"nvd_published_at": null
94+
"nvd_published_at": "2026-03-24T19:16:54Z"
8395
}
8496
}

0 commit comments

Comments
 (0)