Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2025.0049
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2025-0049)
Zusammenfassung:The remote host is missing an update for the 'calibre' package(s) announced via the MGASA-2025-0049 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'calibre' package(s) announced via the MGASA-2025-0049 advisory.

Vulnerability Insight:
link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre
before 6.19.0 can, by default, add resources outside of the document
root. (CVE-2023-46303)
Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to
achieve arbitrary file read. (CVE-2024-6781)
Improper access control in Calibre 6.9.0 ~
7.14.0 allow unauthenticated
attackers to achieve remote code execution. (CVE-2024-6782)
Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform
reflected cross-site scripting. (CVE-2024-7008)
Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions
to perform full-text searches to achieve SQL injection on the SQLite
database. (CVE-2024-7009)

Affected Software/OS:
'calibre' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2023-46303
https://github.com/0x1717/ssrf-via-img
https://github.com/kovidgoyal/calibre/compare/v6.18.1...v6.19.0
Common Vulnerability Exposure (CVE) ID: CVE-2024-6781
Common Vulnerability Exposure (CVE) ID: CVE-2024-6782
Common Vulnerability Exposure (CVE) ID: CVE-2024-7008
Common Vulnerability Exposure (CVE) ID: CVE-2024-7009
CopyrightCopyright (C) 2025 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.