Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vaadin vaadin vulnerabilities and exploits
(subscribe to this query)
1.9
CVSSv2
CVE-2021-31406
Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 up to and including 5.0.3 (Vaadin 15.0.0 up to and including 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows malicious user to guess a sec...
3.3
CVSSv2
CVE-2021-31408
Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 before 6.0.0 (Vaadin 18), and 6.0.0 up to and including 6.0.4 (Vaadin 19.0.0 up to and including 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local ma...
5
CVSSv2
CVE-2021-31410
Overly relaxed configuration of frontend resources server in Vaadin Designer versions 4.3.0 up to and including 4.6.3 allows remote malicious users to access project sources via crafted HTTP request.
5
CVSSv2
CVE-2021-31409
Unsafe validation RegEx in EmailValidator component in com.vaadin:vaadin-compatibility-server versions 8.0.0 up to and including 8.12.4 (Vaadin versions 8.0.0 up to and including 8.12.4) allows malicious users to cause uncontrolled resource consumption by submitting malicious ema...
6.8
CVSSv2
CVE-2019-10240
Eclipse hawkBit versions before 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.
Eclipse Hawkbit 0.3.0
Eclipse Hawkbit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3