Vaadin

Vaadin

23 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 23.04.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:36

Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows ...

  • EPSS 1.8%
  • Veröffentlicht 23.04.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:36

Vulnerability in OSGi integration in com.vaadin:flow-server versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTT...

  • EPSS 0.05%
  • Veröffentlicht 23.04.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:35

Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a sec...

  • EPSS 0.47%
  • Veröffentlicht 23.04.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:35

Unsafe validation RegEx in EmailField component in com.vaadin:vaadin-text-field-flow versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource ...

  • EPSS 0.05%
  • Veröffentlicht 23.04.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:35

Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4...

  • EPSS 0.12%
  • Veröffentlicht 23.04.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:35

Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:vaadin-server versions 7.0.0 through 7.7.23 (Vaadin 7.0.0 through 7.7.23), and 8.0.0 through 8.12.2 (Vaadin 8.0.0 through 8.12.2) allows attacker to guess a security to...

  • EPSS 0.55%
  • Veröffentlicht 23.04.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:29:16

Improper URL validation in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of inten...

Exploit
  • EPSS 0.72%
  • Veröffentlicht 23.04.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:29:16

Unsafe validation RegEx in EmailValidator class in com.vaadin:vaadin-server versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.

  • EPSS 0.39%
  • Veröffentlicht 23.04.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:29:16

Insecure configuration of default ObjectMapper in com.vaadin:flow-server versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. @RestController

  • EPSS 0.35%
  • Veröffentlicht 23.04.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 04:39:46

Missing variable sanitization in Grid component in com.vaadin:vaadin-server versions 7.4.0 through 7.7.19 (Vaadin 7.4.0 through 7.7.19), and 8.0.0 through 8.8.4 (Vaadin 8.0.0 through 8.8.4) allows attacker to inject malicious JavaScript via unspecifi...