A vulnerability has been found in Parse Server up to 4.10.3 and classified as problematic. This vulnerability affects the function Parse.User
of the component Session Token Handler. Upgrading to version 4.10.4 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying the patch 4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Parse Server up to 4.10.3 Session Token Parse.User information disclosure
CVE-2024-12728 : SOPHOS FIREWALL UP TO 20.0 MR2 SSH WEAK CREDENTIALS
Description A weak credentials vulnerability potentially allows privileged system access via SSH to Sophos Firewall older than version 20.0 MR3
CVE-2021-26102 : FORTINET FORTIWAN UP TO 4.4.1/4.5.7 POST REQUEST AUTHENTICATION BYPASS
Description A relative path traversal vulnerability (CWE-23) in FortiWAN version 4.5.7 and below, 4.4 all versions may allow a remote
CVE-2024-35141 : IBM SECURITY VERIFY ACCESS DOCKER UP TO 10.0.6 UNNECESSARY PRIVILEGES
Description IBM Security Verify Access Docker 10.0.0 through 10.0.6 could allow a local user to escalate their privileges due to