Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vaadin vaadin vulnerabilities and exploits
(subscribe to this query)
1.9
CVSSv2
CVE-2021-31406
Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 up to and including 5.0.3 (Vaadin 15.0.0 up to and including 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows malicious user to guess a sec...
3.3
CVSSv2
CVE-2021-31408
Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 before 6.0.0 (Vaadin 18), and 6.0.0 up to and including 6.0.4 (Vaadin 19.0.0 up to and including 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local ma...
5
CVSSv2
CVE-2021-31410
Overly relaxed configuration of frontend resources server in Vaadin Designer versions 4.3.0 up to and including 4.6.3 allows remote malicious users to access project sources via crafted HTTP request.
5
CVSSv2
CVE-2021-31409
Unsafe validation RegEx in EmailValidator component in com.vaadin:vaadin-compatibility-server versions 8.0.0 up to and including 8.12.4 (Vaadin versions 8.0.0 up to and including 8.12.4) allows malicious users to cause uncontrolled resource consumption by submitting malicious ema...
6.8
CVSSv2
CVE-2019-10240
Eclipse hawkBit versions before 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.
Eclipse Hawkbit 0.3.0
Eclipse Hawkbit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3