Browse all 18 CVE security advisories affecting janeczku. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Janeczku is a software component primarily used for data processing and manipulation in enterprise applications. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, accounting for its 18 recorded CVEs. The component's complex input validation and insufficient access controls have frequently been exploited, leading to several high-severity incidents. Security researchers have noted its tendency to trust user-supplied data without proper sanitization, making it a consistent target for attackers. Organizations using janeczku should prioritize patching and implement strict input validation to mitigate ongoing risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-7709 | janeczku Calibre-Web Endpoint kobo_auth.py generate_auth_token improper authorization — Calibre-WebCWE-285 | 6.3 | Medium | 2026-05-03 |
This page lists every published CVE security advisory associated with janeczku. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.