
Configurations which allow users to authenticate using the Parse Server authentication adapter where `appIds` is set as a string instead of an array of strings authenticate requests from an app with a different app ID than the one specified in the `appIds` configuration.

In versions prior to 4.10.16, or from 5.0.0 to 5.2.6, validation of the authentication adapter app ID for _Facebook_ and _Spotify_ may be circumvented. Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. There is a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.Īn issue was discovered in PSPP 1.6.2. Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formWifiMacFilterSet function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string. Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formwrlSSIDset function. Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formSetAutoPing function. Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formwrlSSIDget function. Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formWifiMacFilterGet function. Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the set_local_time function. Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formexeCommand function. The affected version is 0.1.0.Ī vulnerability in Trend Micro Apex One and Apex One as a Service could allow an attacker to intercept and decode certain communication strings that may contain some identification attributes of a particular Apex One server.

The backdoor is the democritus-hypothesis package. The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party.
