VYPR

Maven package

com.vaadin/vaadin-bom

pkg:maven/com.vaadin/vaadin-bom

Vulnerabilities (9)

  • CVE-2021-33611Nov 2, 2021
    affected >= 14.0.0, < 14.4.5fixed 14.4.5

    Missing output sanitization in test sources in org.webjars.bowergithub.vaadin:vaadin-menu-bar versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL

  • CVE-2021-31412Jun 24, 2021
    affected >= 10.0.0, < 10.0.19fixed 10.0.19

    Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaa

  • CVE-2021-33604Jun 24, 2021
    affected >= 14.0.0, < 14.6.2fixed 14.6.2

    URL encoding error in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser.

  • CVE-2021-31411May 5, 2021
    affected >= 14.0.3, < 14.5.3fixed 14.5.3

    Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to

  • CVE-2021-31408Apr 23, 2021
    affected >= 18.0.0, < 19.0.4fixed 19.0.4

    Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusi

  • CVE-2021-31405Apr 23, 2021
    affected >= 14.0.6, < 14.4.4fixed 14.4.4

    Unsafe validation RegEx in EmailField component in com.vaadin:vaadin-text-field-flow versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting mali

  • CVE-2021-31403Apr 23, 2021
    affected >= 7.0.0, < 7.7.24fixed 7.7.24

    Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:vaadin-server versions 7.0.0 through 7.7.23 (Vaadin 7.0.0 through 7.7.23), and 8.0.0 through 8.12.2 (Vaadin 8.0.0 through 8.12.2) allows attacker to guess a security token via timing attack

  • CVE-2020-36320Apr 23, 2021
    affected >= 7.0.0.beta1, < 7.7.22fixed 7.7.22

    Unsafe validation RegEx in EmailValidator class in com.vaadin:vaadin-server versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.

  • CVE-2019-25028Apr 23, 2021
    affected >= 7.4.0, < 7.7.20fixed 7.7.20

    Missing variable sanitization in Grid component in com.vaadin:vaadin-server versions 7.4.0 through 7.7.19 (Vaadin 7.4.0 through 7.7.19), and 8.0.0 through 8.8.4 (Vaadin 8.0.0 through 8.8.4) allows attacker to inject malicious JavaScript via unspecified vector