Vulnerabilities (CVE)

Filtered by vendor Vaadin Subscribe
Filtered by product Flow
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-31411 1 Vaadin 2 Flow, Vaadin 2021-05-18 4.6 MEDIUM 7.8 HIGH
Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds.
CVE-2021-31405 1 Vaadin 2 Flow, Vaadin 2021-05-05 5.0 MEDIUM 7.5 HIGH
Unsafe validation RegEx in EmailField component in com.vaadin:vaadin-text-field-flow versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
CVE-2020-36321 1 Vaadin 2 Flow, Vaadin 2021-05-05 5.0 MEDIUM 7.5 HIGH
Improper URL validation in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
CVE-2021-31407 1 Vaadin 2 Flow, Vaadin 2021-05-05 5.0 MEDIUM 7.5 HIGH
Vulnerability in OSGi integration in com.vaadin:flow-server versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request.
CVE-2021-31408 1 Vaadin 2 Flow, Vaadin 2021-05-04 3.3 LOW 7.1 HIGH
Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.