Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Vaadin | Vaadin | 7.0.0 ~ * | - | |
| Vaadin | vaadin-server | 7.0.0 ~ * | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-31407 | 8.6 HIGH | Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19 |
| CVE-2021-31410 | 8.6 HIGH | Project sources exposure in Vaadin Designer |
| CVE-2020-36320 | 7.5 HIGH | Regular expression Denial of Service (ReDoS) in EmailValidator class in Vaadin 7 |
| CVE-2021-31405 | 7.5 HIGH | Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-1 |
| CVE-2021-31408 | 6.3 MEDIUM | Server session is not invalidated when logout() helper method of Authentication module is |
| CVE-2019-25027 | 6.1 MEDIUM | Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13 |
| CVE-2020-36321 | 5.9 MEDIUM | Directory traversal in development mode handler in Vaadin 14 and 15-17 |
| CVE-2019-25028 | 5.4 MEDIUM | Stored cross-site scripting in Grid component in Vaadin 7 and 8 |
| CVE-2021-31404 | 4.0 MEDIUM | Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18 |
| CVE-2021-31406 | 4.0 MEDIUM | Timing side channel vulnerability in endpoint request handler in Vaadin 15-19 |
| CVE-2020-36319 | 3.1 LOW | Potential sensitive data exposure in applications using Vaadin 15 |
| CVE-2018-25007 | 2.6 LOW | Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11 |
No comments yet