Vulnerabilities > Vaadin
|2022-05-24||CVE-2022-29567|| Information Exposure vulnerability in Vaadin |
The default configuration of a TreeGrid component uses Object::toString as a key on the client-side and server communication in Vaadin 14.8.5 through 14.8.9, 22.0.6 through 22.0.14, 23.0.0.beta2 through 23.0.8 and 23.1.0.alpha1 through 23.1.0.alpha4, resulting in potential information disclosure of values that should not be available on the client-side.
| 5.0 |
|2021-11-02||CVE-2021-33611|| Cross-site Scripting vulnerability in Vaadin |
| 4.3 |
|2021-10-13||CVE-2021-33609|| Resource Exhaustion vulnerability in Vaadin |
Missing check in DataCommunicator class in com.vaadin:vaadin-server versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.
| 4.0 |
|2021-08-25||CVE-2021-33605|| Improper Check for Unusual or Exceptional Conditions vulnerability in Vaadin Vaadin-Checkbox-Flow |
Improper check in CheckboxGroup in com.vaadin:vaadin-checkbox-flow versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled Checkbox inside enabled CheckboxGroup component via unspecified vectors.
| 4.0 |
|2021-06-24||CVE-2021-31412|| Exposure of Resource to Wrong Sphere vulnerability in Vaadin Flow |
Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for NotFoundException is provided.
| 4.3 |
|2021-06-24||CVE-2021-33604|| Unspecified vulnerability in Vaadin Flow-Server and Vaadin |
| 1.2 |
|2021-05-06||CVE-2021-31409|| Resource Exhaustion vulnerability in Vaadin |
Unsafe validation RegEx in EmailValidator component in com.vaadin:vaadin-compatibility-server versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
| 5.0 |
|2021-05-05||CVE-2021-31411|| Unspecified vulnerability in Vaadin Flow |
Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds.
| 4.6 |
|2021-04-23||CVE-2021-31410|| Exposure of Resource to Wrong Sphere vulnerability in Vaadin Designer |
Overly relaxed configuration of frontend resources server in Vaadin Designer versions 4.3.0 through 4.6.3 allows remote attackers to access project sources via crafted HTTP request.
| 5.0 |
|2021-04-23||CVE-2021-31408|| Insufficient Session Expiration vulnerability in Vaadin Flow and Vaadin |
Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.
| 3.3 |