CVE-2021-33611
Summary
| CVE | CVE-2021-33611 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-11-02 10:15:00 UTC |
| Updated | 2021-11-02 23:22:00 UTC |
| Description | Missing output sanitization in test sources in org.webjars.bowergithub.vaadin:vaadin-menu-bar versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| chore: align theme parameters across the visual test files by tomivirkki · Pull Request #126 · vaadin/vaadin-menu-bar · GitHub |
CONFIRM |
github.com |
|
| CVE-2021-33611: Reflected cross-site scripting in vaadin-menu-bar webjar resources in Vaadin 14 |
CONFIRM |
vaadin.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 980224 Java (maven) Security Update for org.webjars.bowergithub.vaadin:vaadin-menu-bar (GHSA-93c4-vf86-3rj7)