Product:

Calibre

(Calibre\-Ebook)
Repositories https://github.com/kovidgoyal/calibre
#Vulnerabilities 10
Date Id Summary Products Score Patch Annotated
2024-08-06 CVE-2024-6781 Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read. Calibre 7.5
2024-08-06 CVE-2024-7008 Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting. Calibre 6.1
2024-08-06 CVE-2024-7009 Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions to perform full-text searches to achieve SQL injection on the SQLite database. Calibre 7.1
2021-12-07 CVE-2021-44686 calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py. Calibre, Fedora 7.5
2023-10-22 CVE-2023-46303 link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before 6.19.0 can, by default, add resources outside of the document root. Calibre 7.5
2021-10-27 CVE-2011-4124 Input validation issues were found in Calibre at devices/linux_mount_helper.c which can lead to argument injection and elevation of privileges. Calibre 9.8
2021-10-27 CVE-2011-4125 A untrusted search path issue was found in Calibre at devices/linux_mount_helper.c leading to the ability of unprivileged users to execute any program as root. Calibre 9.8
2021-10-27 CVE-2011-4126 Race condition issues were found in Calibre at devices/linux_mount_helper.c allowing unprivileged users the ability to mount any device to anywhere. Calibre 8.1
2018-03-08 CVE-2018-7889 gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call. Calibre 7.8
2017-03-16 CVE-2016-10187 The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript. Calibre 5.5