0.6.24
3 years ago
5 months ago
Known vulnerabilities in the calibreweb package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the How to fix Cross-site Scripting (XSS)? Upgrade | [,0.6.22) |
calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database. Affected versions of this package are vulnerable to Weak Password Requirements due to missing rate limits in the login functionality. How to fix Weak Password Requirements? Upgrade | [,0.6.20) |
calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database. Affected versions of this package are vulnerable to Brute Force due to missing rate limiting in login form. How to fix Brute Force? Upgrade | [,0.6.20) |
calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database. Affected versions of this package are vulnerable to SQL Injection in the user table. How to fix SQL Injection? Upgrade | [,0.6.18) |
calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to improper fix of CVE-2022-0767 and CVE-2022-0766 which only address loopback/localhost IP addresses which can allow attacker to access internal endpoints. How to fix Server-side Request Forgery (SSRF)? Upgrade | [,0.6.18) |
calibreweb is a Web app for browsing, reading and downloading eBooks stored in a Calibre database. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to improper fix CVE-2022-0767, which makes it possible to be bypassed via the IPV4/IPV4 embedding. How to fix Server-side Request Forgery (SSRF)? Upgrade | [,0.6.18) |