Filtered by vendor Janeczku
Subscribe
Total
21 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-3986 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | N/A | 4.3 MEDIUM |
A vulnerability in janeczku/calibre-web allows unauthorized users to view the names of private shelves belonging to other users. This issue occurs in the file shelf.py at line 221, where the name of the shelf is exposed in an error message when a user attempts to remove a book from a shelf they do not own. This vulnerability discloses private information and affects all versions prior to the fix. | |||||
CVE-2021-3987 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | N/A | 4.3 MEDIUM |
An improper access control vulnerability exists in janeczku/calibre-web. The affected version allows users without public shelf permissions to create public shelves. The vulnerability is due to the `create_shelf` method in `shelf.py` not verifying if the user has the necessary permissions to create a public shelf. This issue can lead to unauthorized actions being performed by users. | |||||
CVE-2021-3988 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | N/A | 6.1 MEDIUM |
A Cross-site Scripting (XSS) vulnerability exists in janeczku/calibre-web, specifically in the file `edit_books.js`. The vulnerability occurs when editing book properties, such as uploading a cover or a format. The affected code directly inserts user input into the DOM without proper sanitization, allowing attackers to execute arbitrary JavaScript code. This can lead to various attacks, including stealing cookies. The issue is present in the code handling the `#btn-upload-cover` change event. | |||||
CVE-2021-4164 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 6.8 MEDIUM | 8.8 HIGH |
calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) | |||||
CVE-2022-0352 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site Scripting (XSS) - Reflected in Pypi calibreweb prior to 0.6.16. | |||||
CVE-2022-0273 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 4.0 MEDIUM | 6.5 MEDIUM |
Improper Access Control in Pypi calibreweb prior to 0.6.16. | |||||
CVE-2021-4171 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 7.5 HIGH | 9.8 CRITICAL |
calibre-web is vulnerable to Business Logic Errors | |||||
CVE-2022-2525 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | N/A | 9.8 CRITICAL |
Improper Restriction of Excessive Authentication Attempts in GitHub repository janeczku/calibre-web prior to 0.6.20. | |||||
CVE-2022-0767 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 7.5 HIGH | 9.9 CRITICAL |
Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17. | |||||
CVE-2022-0939 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 7.5 HIGH | 9.9 CRITICAL |
Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18. | |||||
CVE-2022-0766 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 7.5 HIGH | 9.8 CRITICAL |
Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17. | |||||
CVE-2022-0339 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 7.5 HIGH | 9.8 CRITICAL |
Server-Side Request Forgery (SSRF) in Pypi calibreweb prior to 0.6.16. | |||||
CVE-2022-0406 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 4.0 MEDIUM | 4.3 MEDIUM |
Improper Authorization in GitHub repository janeczku/calibre-web prior to 0.6.16. | |||||
CVE-2021-4170 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 3.5 LOW | 5.4 MEDIUM |
calibre-web is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | |||||
CVE-2022-0990 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 6.4 MEDIUM | 9.1 CRITICAL |
Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18. | |||||
CVE-2023-2106 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | N/A | 9.8 CRITICAL |
Weak Password Requirements in GitHub repository janeczku/calibre-web prior to 0.6.20. | |||||
CVE-2021-25964 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 3.5 LOW | 5.4 MEDIUM |
In “Calibre-web” application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in “Metadata”. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered. | |||||
CVE-2021-25965 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 6.8 MEDIUM | 8.8 HIGH |
In Calibre-web, versions 0.6.0 to 0.6.13 are vulnerable to Cross-Site Request Forgery (CSRF). By luring an authenticated user to click on a link, an attacker can create a new user role with admin privileges and attacker-controlled credentials, allowing them to take over the application. | |||||
CVE-2020-12627 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 7.5 HIGH | 9.8 CRITICAL |
Calibre-Web 0.6.6 allows authentication bypass because of the 'A0Zr98j/3yX R~XHH!jmN]LWX/,?RT' hardcoded secret key. | |||||
CVE-2022-0405 | 1 Janeczku | 1 Calibre-web | 2024-11-19 | 4.0 MEDIUM | 4.3 MEDIUM |
Improper Access Control in GitHub repository janeczku/calibre-web prior to 0.6.16. |