CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions to perform full-text searches to achieve SQL injection on the SQLite database. | 7.1 |
High |
||
Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting. | 6.1 |
Medium |
||
Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read. | 7.5 |
High |
||
link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before 6.19.0 can, by default, add resources outside of the document root. | 7.5 |
High |
||
calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py. | 7.5 |
High |
||
The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript. | 5.5 |
Medium |