Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
Typedeb
Namespacedebian
Namecalibre
Version9.6.0+ds+~0.10.5-6
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version9.7.0+ds+~0.10.5-2
Latest_non_vulnerable_version9.7.0+ds+~0.10.5-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1uhd-3upf-nqbu
vulnerability_id VCID-1uhd-3upf-nqbu
summary Race condition issues were found in Calibre at devices/linux_mount_helper.c allowing unprivileged users the ability to mount any device to anywhere.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4126
reference_id
reference_type
scores
0
value 0.00486
scoring_system epss
scoring_elements 0.65296
published_at 2026-04-01T12:55:00Z
1
value 0.00486
scoring_system epss
scoring_elements 0.65345
published_at 2026-04-02T12:55:00Z
2
value 0.00486
scoring_system epss
scoring_elements 0.65371
published_at 2026-04-04T12:55:00Z
3
value 0.00486
scoring_system epss
scoring_elements 0.65336
published_at 2026-04-07T12:55:00Z
4
value 0.00486
scoring_system epss
scoring_elements 0.65388
published_at 2026-04-08T12:55:00Z
5
value 0.00486
scoring_system epss
scoring_elements 0.65399
published_at 2026-04-09T12:55:00Z
6
value 0.00486
scoring_system epss
scoring_elements 0.65418
published_at 2026-04-11T12:55:00Z
7
value 0.00486
scoring_system epss
scoring_elements 0.65405
published_at 2026-04-12T12:55:00Z
8
value 0.00486
scoring_system epss
scoring_elements 0.65378
published_at 2026-04-13T12:55:00Z
9
value 0.00486
scoring_system epss
scoring_elements 0.65414
published_at 2026-04-16T12:55:00Z
10
value 0.00486
scoring_system epss
scoring_elements 0.65425
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4126
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4126
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584915
reference_id 584915
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584915
fixed_packages
0
url pkg:deb/debian/calibre@1.5.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/calibre@1.5.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@1.5.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2011-4126
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1uhd-3upf-nqbu
1
url VCID-2w1b-b6qm-4qhf
vulnerability_id VCID-2w1b-b6qm-4qhf
summary calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a Server-Side Request Forgery vulnerability in the background-image endpoint of calibre e-book reader's web view allows an attacker to perform blind GET requests to arbitrary URLs and exfiltrate information out from the ebook sandbox. Version 9.6.0 patches the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33205
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02119
published_at 2026-04-18T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02107
published_at 2026-04-16T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02154
published_at 2026-04-08T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.0216
published_at 2026-04-04T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02155
published_at 2026-04-07T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02172
published_at 2026-04-09T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02151
published_at 2026-04-11T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02136
published_at 2026-04-12T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02132
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33205
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33205
2
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-4926-v9px-wv7v
reference_id GHSA-4926-v9px-wv7v
reference_type
scores
0
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T18:57:50Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-4926-v9px-wv7v
fixed_packages
0
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
2
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2026-33205
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w1b-b6qm-4qhf
2
url VCID-4gvv-bsf9-vqca
vulnerability_id VCID-4gvv-bsf9-vqca
summary Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46303
reference_id
reference_type
scores
0
value 0.00567
scoring_system epss
scoring_elements 0.68536
published_at 2026-04-18T12:55:00Z
1
value 0.00567
scoring_system epss
scoring_elements 0.68523
published_at 2026-04-16T12:55:00Z
2
value 0.00567
scoring_system epss
scoring_elements 0.68438
published_at 2026-04-02T12:55:00Z
3
value 0.00567
scoring_system epss
scoring_elements 0.68458
published_at 2026-04-04T12:55:00Z
4
value 0.00567
scoring_system epss
scoring_elements 0.68434
published_at 2026-04-07T12:55:00Z
5
value 0.00567
scoring_system epss
scoring_elements 0.68485
published_at 2026-04-08T12:55:00Z
6
value 0.00567
scoring_system epss
scoring_elements 0.68501
published_at 2026-04-09T12:55:00Z
7
value 0.00567
scoring_system epss
scoring_elements 0.68527
published_at 2026-04-11T12:55:00Z
8
value 0.00567
scoring_system epss
scoring_elements 0.68515
published_at 2026-04-12T12:55:00Z
9
value 0.00567
scoring_system epss
scoring_elements 0.68482
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46303
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46303
2
reference_url https://security.gentoo.org/glsa/202409-04
reference_id GLSA-202409-04
reference_type
scores
url https://security.gentoo.org/glsa/202409-04
3
reference_url https://github.com/0x1717/ssrf-via-img
reference_id ssrf-via-img
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-16T13:24:03Z/
url https://github.com/0x1717/ssrf-via-img
4
reference_url https://github.com/kovidgoyal/calibre/compare/v6.18.1...v6.19.0
reference_id v6.18.1...v6.19.0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-16T13:24:03Z/
url https://github.com/kovidgoyal/calibre/compare/v6.18.1...v6.19.0
fixed_packages
0
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/calibre@6.19.1-1?distro=trixie
purl pkg:deb/debian/calibre@6.19.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.19.1-1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
8
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
9
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2023-46303
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gvv-bsf9-vqca
3
url VCID-4kgm-mmjn-g3a7
vulnerability_id VCID-4kgm-mmjn-g3a7
summary The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10187
reference_id
reference_type
scores
0
value 0.0039
scoring_system epss
scoring_elements 0.60114
published_at 2026-04-18T12:55:00Z
1
value 0.0039
scoring_system epss
scoring_elements 0.6007
published_at 2026-04-13T12:55:00Z
2
value 0.0039
scoring_system epss
scoring_elements 0.60108
published_at 2026-04-16T12:55:00Z
3
value 0.0039
scoring_system epss
scoring_elements 0.59944
published_at 2026-04-01T12:55:00Z
4
value 0.0039
scoring_system epss
scoring_elements 0.60022
published_at 2026-04-02T12:55:00Z
5
value 0.0039
scoring_system epss
scoring_elements 0.60046
published_at 2026-04-04T12:55:00Z
6
value 0.0039
scoring_system epss
scoring_elements 0.60016
published_at 2026-04-07T12:55:00Z
7
value 0.0039
scoring_system epss
scoring_elements 0.60066
published_at 2026-04-08T12:55:00Z
8
value 0.0039
scoring_system epss
scoring_elements 0.6008
published_at 2026-04-09T12:55:00Z
9
value 0.0039
scoring_system epss
scoring_elements 0.60101
published_at 2026-04-11T12:55:00Z
10
value 0.0039
scoring_system epss
scoring_elements 0.60087
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10187
1
reference_url https://bugs.launchpad.net/calibre/+bug/1651728
reference_id
reference_type
scores
url https://bugs.launchpad.net/calibre/+bug/1651728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10187
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kovidgoyal/calibre/commit/3a89718664cb8c
reference_id
reference_type
scores
url https://github.com/kovidgoyal/calibre/commit/3a89718664cb8c
5
reference_url http://www.openwall.com/lists/oss-security/2017/01/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/29/8
6
reference_url http://www.openwall.com/lists/oss-security/2017/01/31/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/31/9
7
reference_url http://www.securityfocus.com/bid/95909
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95909
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853004
reference_id 853004
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853004
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10187
reference_id CVE-2016-10187
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-10187
fixed_packages
0
url pkg:deb/debian/calibre@2.75.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/calibre@2.75.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@2.75.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2016-10187
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kgm-mmjn-g3a7
4
url VCID-62s7-w8zq-zfg5
vulnerability_id VCID-62s7-w8zq-zfg5
summary Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6782
reference_id
reference_type
scores
0
value 0.93835
scoring_system epss
scoring_elements 0.99863
published_at 2026-04-12T12:55:00Z
1
value 0.93835
scoring_system epss
scoring_elements 0.99864
published_at 2026-04-18T12:55:00Z
2
value 0.93876
scoring_system epss
scoring_elements 0.99869
published_at 2026-04-02T12:55:00Z
3
value 0.93876
scoring_system epss
scoring_elements 0.9987
published_at 2026-04-07T12:55:00Z
4
value 0.93876
scoring_system epss
scoring_elements 0.99871
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6782
1
reference_url https://starlabs.sg/advisories/24/24-6782/
reference_id 24-6782
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-08-08T20:04:18Z/
url https://starlabs.sg/advisories/24/24-6782/
2
reference_url https://github.com/kovidgoyal/calibre/commit/38a1bf50d8cd22052ae59c513816706c6445d5e9
reference_id 38a1bf50d8cd22052ae59c513816706c6445d5e9
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-08-08T20:04:18Z/
url https://github.com/kovidgoyal/calibre/commit/38a1bf50d8cd22052ae59c513816706c6445d5e9
3
reference_url https://security.gentoo.org/glsa/202409-04
reference_id GLSA-202409-04
reference_type
scores
url https://security.gentoo.org/glsa/202409-04
fixed_packages
0
url pkg:deb/debian/calibre@0?distro=trixie
purl pkg:deb/debian/calibre@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@0%3Fdistro=trixie
1
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/calibre@7.16.0%2Bds-1?distro=trixie
purl pkg:deb/debian/calibre@7.16.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@7.16.0%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
8
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
9
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2024-6782
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62s7-w8zq-zfg5
5
url VCID-b3vv-xdp2-7ub8
vulnerability_id VCID-b3vv-xdp2-7ub8
summary calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64486
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09639
published_at 2026-04-08T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09542
published_at 2026-04-16T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09652
published_at 2026-04-13T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09668
published_at 2026-04-12T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.097
published_at 2026-04-11T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09687
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09566
published_at 2026-04-07T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11816
published_at 2026-04-18T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16906
published_at 2026-04-04T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16849
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64486
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64486
2
reference_url https://github.com/kovidgoyal/calibre/commit/6f94bce214bf7d43c829804db3741afa5e83c0c5
reference_id 6f94bce214bf7d43c829804db3741afa5e83c0c5
reference_type
scores
0
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T21:34:15Z/
url https://github.com/kovidgoyal/calibre/commit/6f94bce214bf7d43c829804db3741afa5e83c0c5
3
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g
reference_id GHSA-hpwq-c98h-xp8g
reference_type
scores
0
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-13T21:34:15Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g
fixed_packages
0
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
1
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/calibre@8.14.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@8.14.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.14.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
4
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2025-64486
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3vv-xdp2-7ub8
6
url VCID-bjj5-ynf7-v7aa
vulnerability_id VCID-bjj5-ynf7-v7aa
summary calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting existing files. This can lead to potential code execution and Denial of Service through file corruption. This issue has been fixed in version 9.3.0.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-26065
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11247
published_at 2026-04-18T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11413
published_at 2026-04-12T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11384
published_at 2026-04-13T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11246
published_at 2026-04-16T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11454
published_at 2026-04-02T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11513
published_at 2026-04-04T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.113
published_at 2026-04-07T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11382
published_at 2026-04-08T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11441
published_at 2026-04-09T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11446
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-26065
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26065
2
reference_url https://github.com/kovidgoyal/calibre/commit/b6da1c3878c06eb1356cb0ec1106cb66e0e9bfb8
reference_id b6da1c3878c06eb1356cb0ec1106cb66e0e9bfb8
reference_type
scores
0
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-20T16:41:04Z/
url https://github.com/kovidgoyal/calibre/commit/b6da1c3878c06eb1356cb0ec1106cb66e0e9bfb8
3
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-vmfh-7mr7-pp2w
reference_id GHSA-vmfh-7mr7-pp2w
reference_type
scores
0
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-20T16:41:04Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-vmfh-7mr7-pp2w
fixed_packages
0
url pkg:deb/debian/calibre@9.3.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.3.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.3.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
2
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2026-26065
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjj5-ynf7-v7aa
7
url VCID-dywq-dzuv-wka2
vulnerability_id VCID-dywq-dzuv-wka2
summary calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33206
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01603
published_at 2026-04-18T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01589
published_at 2026-04-16T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01609
published_at 2026-04-02T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01616
published_at 2026-04-07T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01618
published_at 2026-04-08T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01625
published_at 2026-04-09T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01611
published_at 2026-04-11T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01602
published_at 2026-04-12T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01601
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33206
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33206
2
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-h3p4-m74f-43g6
reference_id GHSA-h3p4-m74f-43g6
reference_type
scores
0
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T14:48:39Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-h3p4-m74f-43g6
fixed_packages
0
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
2
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2026-33206
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dywq-dzuv-wka2
8
url VCID-favj-1bjh-9uff
vulnerability_id VCID-favj-1bjh-9uff
summary calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44686
reference_id
reference_type
scores
0
value 0.00412
scoring_system epss
scoring_elements 0.61347
published_at 2026-04-01T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61424
published_at 2026-04-02T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61452
published_at 2026-04-04T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61423
published_at 2026-04-07T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.6147
published_at 2026-04-08T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.61485
published_at 2026-04-09T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.61506
published_at 2026-04-11T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61493
published_at 2026-04-12T12:55:00Z
8
value 0.00412
scoring_system epss
scoring_elements 0.61473
published_at 2026-04-13T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61512
published_at 2026-04-16T12:55:00Z
10
value 0.00412
scoring_system epss
scoring_elements 0.61517
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44686
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44686
fixed_packages
0
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/calibre@5.33.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/calibre@5.33.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.33.0%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
8
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2021-44686
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-favj-1bjh-9uff
9
url VCID-hgmk-8s7s-tfdb
vulnerability_id VCID-hgmk-8s7s-tfdb
summary calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by any authenticated user and can also be triggered by tricking an authenticated victim into clicking a crafted link. Version 9.4.0 contains a fix for the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27810
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16303
published_at 2026-04-18T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16283
published_at 2026-04-16T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16461
published_at 2026-04-02T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16523
published_at 2026-04-04T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16319
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16404
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16463
published_at 2026-04-09T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16448
published_at 2026-04-11T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16409
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16346
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27810
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27810
2
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-5fpj-fxw7-8grw
reference_id GHSA-5fpj-fxw7-8grw
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-02T12:53:21Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-5fpj-fxw7-8grw
fixed_packages
0
url pkg:deb/debian/calibre@9.4.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.4.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.4.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
2
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2026-27810
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgmk-8s7s-tfdb
10
url VCID-jwpx-aqjh-dqej
vulnerability_id VCID-jwpx-aqjh-dqej
summary calibre: Calibre: Remote Code Execution via path traversal in CHM reader
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25635.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-25635
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24132
published_at 2026-04-02T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.23956
published_at 2026-04-07T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.2417
published_at 2026-04-04T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24023
published_at 2026-04-08T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24069
published_at 2026-04-09T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24087
published_at 2026-04-11T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24043
published_at 2026-04-12T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.23986
published_at 2026-04-13T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26229
published_at 2026-04-18T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26254
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-25635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2437936
reference_id 2437936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2437936
5
reference_url https://github.com/kovidgoyal/calibre/commit/9739232fcb029ac15dfe52ccd4fdb4a07ebb6ce9
reference_id 9739232fcb029ac15dfe52ccd4fdb4a07ebb6ce9
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-09T15:20:48Z/
url https://github.com/kovidgoyal/calibre/commit/9739232fcb029ac15dfe52ccd4fdb4a07ebb6ce9
6
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-32vh-whvh-9fxr
reference_id GHSA-32vh-whvh-9fxr
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-09T15:20:48Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-32vh-whvh-9fxr
fixed_packages
0
url pkg:deb/debian/calibre@9.2.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.2.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.2.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
2
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2026-25635
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwpx-aqjh-dqej
11
url VCID-mqmp-g7uy-gbg4
vulnerability_id VCID-mqmp-g7uy-gbg4
summary calibre: Calibre: Arbitrary file write via crafted RocketBook (.rb) file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-30853.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-30853.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-30853
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.0217
published_at 2026-04-11T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02172
published_at 2026-04-08T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02171
published_at 2026-04-07T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02194
published_at 2026-04-09T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02154
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02151
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02176
published_at 2026-04-04T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02672
published_at 2026-04-18T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02664
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-30853
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30853
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447437
reference_id 2447437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447437
4
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-7mp7-rfrg-542x
reference_id GHSA-7mp7-rfrg-542x
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T19:42:19Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-7mp7-rfrg-542x
fixed_packages
0
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
2
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2026-30853
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqmp-g7uy-gbg4
12
url VCID-nj3z-4ya4-bqf7
vulnerability_id VCID-nj3z-4ya4-bqf7
summary calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without any validation or trusted-proxy configuration, an attacker can bypass IP-based bans by simply changing or adding this header, rendering the brute-force protection completely ineffective. This is particularly dangerous for calibre servers exposed to the internet, where brute-force protection is the primary defense against credential stuffing and password guessing attacks. Version 9.4.0 contains a fix for the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27824
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05368
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05398
published_at 2026-04-04T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05405
published_at 2026-04-07T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.0544
published_at 2026-04-08T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05461
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07707
published_at 2026-04-12T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07605
published_at 2026-04-18T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07722
published_at 2026-04-11T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07617
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07692
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27824
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27824
2
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-vhxc-r7v8-2xrw
reference_id GHSA-vhxc-r7v8-2xrw
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-02T12:54:19Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-vhxc-r7v8-2xrw
fixed_packages
0
url pkg:deb/debian/calibre@9.4.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.4.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.4.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
2
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2026-27824
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nj3z-4ya4-bqf7
13
url VCID-pa4n-csyj-wqet
vulnerability_id VCID-pa4n-csyj-wqet
summary Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7009
reference_id
reference_type
scores
0
value 0.08423
scoring_system epss
scoring_elements 0.92349
published_at 2026-04-18T12:55:00Z
1
value 0.08423
scoring_system epss
scoring_elements 0.92339
published_at 2026-04-11T12:55:00Z
2
value 0.08423
scoring_system epss
scoring_elements 0.92341
published_at 2026-04-12T12:55:00Z
3
value 0.08423
scoring_system epss
scoring_elements 0.92338
published_at 2026-04-13T12:55:00Z
4
value 0.08423
scoring_system epss
scoring_elements 0.9235
published_at 2026-04-16T12:55:00Z
5
value 0.08423
scoring_system epss
scoring_elements 0.9231
published_at 2026-04-02T12:55:00Z
6
value 0.08423
scoring_system epss
scoring_elements 0.92315
published_at 2026-04-04T12:55:00Z
7
value 0.08423
scoring_system epss
scoring_elements 0.92318
published_at 2026-04-07T12:55:00Z
8
value 0.08423
scoring_system epss
scoring_elements 0.92329
published_at 2026-04-08T12:55:00Z
9
value 0.08423
scoring_system epss
scoring_elements 0.92334
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7009
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7009
2
reference_url https://starlabs.sg/advisories/24/24-7009/
reference_id 24-7009
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T13:15:35Z/
url https://starlabs.sg/advisories/24/24-7009/
3
reference_url https://github.com/kovidgoyal/calibre/commit/d56574285e8859d3d715eb7829784ee74337b7d7
reference_id d56574285e8859d3d715eb7829784ee74337b7d7
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T13:15:35Z/
url https://github.com/kovidgoyal/calibre/commit/d56574285e8859d3d715eb7829784ee74337b7d7
4
reference_url https://security.gentoo.org/glsa/202409-04
reference_id GLSA-202409-04
reference_type
scores
url https://security.gentoo.org/glsa/202409-04
fixed_packages
0
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u4%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/calibre@7.16.0%2Bds-1?distro=trixie
purl pkg:deb/debian/calibre@7.16.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@7.16.0%252Bds-1%3Fdistro=trixie
4
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
8
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2024-7009
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pa4n-csyj-wqet
14
url VCID-qsbr-up7k-kbcr
vulnerability_id VCID-qsbr-up7k-kbcr
summary Input validation issues were found in Calibre at devices/linux_mount_helper.c which can lead to argument injection and elevation of privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4124
reference_id
reference_type
scores
0
value 0.00627
scoring_system epss
scoring_elements 0.70153
published_at 2026-04-01T12:55:00Z
1
value 0.00627
scoring_system epss
scoring_elements 0.70165
published_at 2026-04-02T12:55:00Z
2
value 0.00627
scoring_system epss
scoring_elements 0.70182
published_at 2026-04-04T12:55:00Z
3
value 0.00627
scoring_system epss
scoring_elements 0.7016
published_at 2026-04-07T12:55:00Z
4
value 0.00627
scoring_system epss
scoring_elements 0.70207
published_at 2026-04-08T12:55:00Z
5
value 0.00627
scoring_system epss
scoring_elements 0.70221
published_at 2026-04-09T12:55:00Z
6
value 0.00627
scoring_system epss
scoring_elements 0.70245
published_at 2026-04-11T12:55:00Z
7
value 0.00627
scoring_system epss
scoring_elements 0.7023
published_at 2026-04-12T12:55:00Z
8
value 0.00627
scoring_system epss
scoring_elements 0.70217
published_at 2026-04-13T12:55:00Z
9
value 0.00627
scoring_system epss
scoring_elements 0.70259
published_at 2026-04-16T12:55:00Z
10
value 0.00627
scoring_system epss
scoring_elements 0.70268
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4124
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4124
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584915
reference_id 584915
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584915
fixed_packages
0
url pkg:deb/debian/calibre@1.5.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/calibre@1.5.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@1.5.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2011-4124
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qsbr-up7k-kbcr
15
url VCID-rrh8-rvrz-mkdz
vulnerability_id VCID-rrh8-rvrz-mkdz
summary Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6781
reference_id
reference_type
scores
0
value 0.93721
scoring_system epss
scoring_elements 0.99851
published_at 2026-04-18T12:55:00Z
1
value 0.93721
scoring_system epss
scoring_elements 0.9985
published_at 2026-04-12T12:55:00Z
2
value 0.93767
scoring_system epss
scoring_elements 0.99854
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6781
1
reference_url https://starlabs.sg/advisories/24/24-6781/
reference_id 24-6781
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T14:44:09Z/
url https://starlabs.sg/advisories/24/24-6781/
2
reference_url https://github.com/kovidgoyal/calibre/commit/bcd0ab12c41a887f8290a9b56e46c3a29038d9c4
reference_id bcd0ab12c41a887f8290a9b56e46c3a29038d9c4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T14:44:09Z/
url https://github.com/kovidgoyal/calibre/commit/bcd0ab12c41a887f8290a9b56e46c3a29038d9c4
3
reference_url https://security.gentoo.org/glsa/202409-04
reference_id GLSA-202409-04
reference_type
scores
url https://security.gentoo.org/glsa/202409-04
fixed_packages
0
url pkg:deb/debian/calibre@0?distro=trixie
purl pkg:deb/debian/calibre@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@0%3Fdistro=trixie
1
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/calibre@7.16.0%2Bds-1?distro=trixie
purl pkg:deb/debian/calibre@7.16.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@7.16.0%252Bds-1%3Fdistro=trixie
4
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
8
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2024-6781
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rrh8-rvrz-mkdz
16
url VCID-stnm-9pm7-gqbv
vulnerability_id VCID-stnm-9pm7-gqbv
summary A untrusted search path issue was found in Calibre at devices/linux_mount_helper.c leading to the ability of unprivileged users to execute any program as root.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4125
reference_id
reference_type
scores
0
value 0.00736
scoring_system epss
scoring_elements 0.72756
published_at 2026-04-01T12:55:00Z
1
value 0.00736
scoring_system epss
scoring_elements 0.72764
published_at 2026-04-02T12:55:00Z
2
value 0.00736
scoring_system epss
scoring_elements 0.72784
published_at 2026-04-04T12:55:00Z
3
value 0.00736
scoring_system epss
scoring_elements 0.7276
published_at 2026-04-07T12:55:00Z
4
value 0.00736
scoring_system epss
scoring_elements 0.72798
published_at 2026-04-08T12:55:00Z
5
value 0.00736
scoring_system epss
scoring_elements 0.72812
published_at 2026-04-09T12:55:00Z
6
value 0.00736
scoring_system epss
scoring_elements 0.72836
published_at 2026-04-11T12:55:00Z
7
value 0.00736
scoring_system epss
scoring_elements 0.72819
published_at 2026-04-12T12:55:00Z
8
value 0.00736
scoring_system epss
scoring_elements 0.72811
published_at 2026-04-13T12:55:00Z
9
value 0.00736
scoring_system epss
scoring_elements 0.72852
published_at 2026-04-16T12:55:00Z
10
value 0.00736
scoring_system epss
scoring_elements 0.72863
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4125
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4125
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584915
reference_id 584915
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584915
fixed_packages
0
url pkg:deb/debian/calibre@1.5.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/calibre@1.5.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@1.5.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2011-4125
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stnm-9pm7-gqbv
17
url VCID-vq4p-dvg4-eudz
vulnerability_id VCID-vq4p-dvg4-eudz
summary calibre: Calibre: Arbitrary file corruption via path traversal in EPUB conversion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25636.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-25636
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05964
published_at 2026-04-07T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05948
published_at 2026-04-02T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05981
published_at 2026-04-04T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.06003
published_at 2026-04-08T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.06041
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.06031
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.06022
published_at 2026-04-12T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.06014
published_at 2026-04-13T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07061
published_at 2026-04-18T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07085
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-25636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25636
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2437730
reference_id 2437730
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2437730
5
reference_url https://github.com/kovidgoyal/calibre/commit/9484ea82c6ab226c18e6ca5aa000fa16de598726
reference_id 9484ea82c6ab226c18e6ca5aa000fa16de598726
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:19:25Z/
url https://github.com/kovidgoyal/calibre/commit/9484ea82c6ab226c18e6ca5aa000fa16de598726
6
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-8r26-m7j5-hm29
reference_id GHSA-8r26-m7j5-hm29
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:19:25Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-8r26-m7j5-hm29
fixed_packages
0
url pkg:deb/debian/calibre@9.2.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.2.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.2.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
2
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2026-25636
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vq4p-dvg4-eudz
18
url VCID-x63d-4kux-cqcu
vulnerability_id VCID-x63d-4kux-cqcu
summary calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows, this leads to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. Function extract_pictures only checks startswith('Pictures'), and does not sanitize '..' sequences. calibre's own ZipFile.extractall() in utils/zipfile.py does sanitize '..' via _get_targetpath(), but extract_pictures() bypasses this by using manual zf.read() + open(). This issue has been fixed in version 9.3.0.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-26064
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20605
published_at 2026-04-18T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20675
published_at 2026-04-12T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20622
published_at 2026-04-13T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20608
published_at 2026-04-16T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20787
published_at 2026-04-02T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20846
published_at 2026-04-04T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2056
published_at 2026-04-07T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20636
published_at 2026-04-08T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20698
published_at 2026-04-09T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20718
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-26064
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26064
2
reference_url https://github.com/kovidgoyal/calibre/commit/e1b5f9b45a5e8fa96c136963ad9a1d35e6adac62
reference_id e1b5f9b45a5e8fa96c136963ad9a1d35e6adac62
reference_type
scores
0
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-20T15:29:11Z/
url https://github.com/kovidgoyal/calibre/commit/e1b5f9b45a5e8fa96c136963ad9a1d35e6adac62
3
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-72ch-3hqc-pgmp
reference_id GHSA-72ch-3hqc-pgmp
reference_type
scores
0
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-20T15:29:11Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-72ch-3hqc-pgmp
fixed_packages
0
url pkg:deb/debian/calibre@9.3.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.3.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.3.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
2
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2026-26064
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x63d-4kux-cqcu
19
url VCID-xhf1-k7jg-6ued
vulnerability_id VCID-xhf1-k7jg-6ued
summary gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7889
reference_id
reference_type
scores
0
value 0.10883
scoring_system epss
scoring_elements 0.93409
published_at 2026-04-18T12:55:00Z
1
value 0.10883
scoring_system epss
scoring_elements 0.93354
published_at 2026-04-01T12:55:00Z
2
value 0.10883
scoring_system epss
scoring_elements 0.93362
published_at 2026-04-02T12:55:00Z
3
value 0.10883
scoring_system epss
scoring_elements 0.9337
published_at 2026-04-07T12:55:00Z
4
value 0.10883
scoring_system epss
scoring_elements 0.93377
published_at 2026-04-08T12:55:00Z
5
value 0.10883
scoring_system epss
scoring_elements 0.93381
published_at 2026-04-09T12:55:00Z
6
value 0.10883
scoring_system epss
scoring_elements 0.93386
published_at 2026-04-13T12:55:00Z
7
value 0.10883
scoring_system epss
scoring_elements 0.93385
published_at 2026-04-12T12:55:00Z
8
value 0.10883
scoring_system epss
scoring_elements 0.93405
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7889
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7889
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892242
reference_id 892242
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892242
3
reference_url https://security.archlinux.org/ASA-201803-8
reference_id ASA-201803-8
reference_type
scores
url https://security.archlinux.org/ASA-201803-8
4
reference_url https://security.archlinux.org/AVG-650
reference_id AVG-650
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-650
fixed_packages
0
url pkg:deb/debian/calibre@3.19.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/calibre@3.19.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@3.19.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2018-7889
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xhf1-k7jg-6ued
20
url VCID-ycp8-ws8x-3qbn
vulnerability_id VCID-ycp8-ws8x-3qbn
summary Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7008
reference_id
reference_type
scores
0
value 0.12708
scoring_system epss
scoring_elements 0.93973
published_at 2026-04-04T12:55:00Z
1
value 0.12708
scoring_system epss
scoring_elements 0.93988
published_at 2026-04-09T12:55:00Z
2
value 0.12708
scoring_system epss
scoring_elements 0.93984
published_at 2026-04-08T12:55:00Z
3
value 0.12708
scoring_system epss
scoring_elements 0.93976
published_at 2026-04-07T12:55:00Z
4
value 0.12708
scoring_system epss
scoring_elements 0.93964
published_at 2026-04-02T12:55:00Z
5
value 0.13396
scoring_system epss
scoring_elements 0.94212
published_at 2026-04-18T12:55:00Z
6
value 0.13396
scoring_system epss
scoring_elements 0.94191
published_at 2026-04-13T12:55:00Z
7
value 0.13396
scoring_system epss
scoring_elements 0.94207
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7008
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7008
2
reference_url https://starlabs.sg/advisories/24/24-7008/
reference_id 24-7008
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:34:54Z/
url https://starlabs.sg/advisories/24/24-7008/
3
reference_url https://github.com/kovidgoyal/calibre/commit/863abac24e7bc3e5ca0b3307362ff1953ba53fe0
reference_id 863abac24e7bc3e5ca0b3307362ff1953ba53fe0
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:34:54Z/
url https://github.com/kovidgoyal/calibre/commit/863abac24e7bc3e5ca0b3307362ff1953ba53fe0
4
reference_url https://security.gentoo.org/glsa/202409-04
reference_id GLSA-202409-04
reference_type
scores
url https://security.gentoo.org/glsa/202409-04
fixed_packages
0
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u4%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/calibre@7.16.0%2Bds-1?distro=trixie
purl pkg:deb/debian/calibre@7.16.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@7.16.0%252Bds-1%3Fdistro=trixie
4
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
8
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2024-7008
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycp8-ws8x-3qbn
21
url VCID-z6j2-32tf-g7ax
vulnerability_id VCID-z6j2-32tf-g7ax
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1028.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1028
reference_id
reference_type
scores
0
value 0.09896
scoring_system epss
scoring_elements 0.93017
published_at 2026-04-18T12:55:00Z
1
value 0.09896
scoring_system epss
scoring_elements 0.92976
published_at 2026-04-01T12:55:00Z
2
value 0.09896
scoring_system epss
scoring_elements 0.92984
published_at 2026-04-02T12:55:00Z
3
value 0.09896
scoring_system epss
scoring_elements 0.92988
published_at 2026-04-04T12:55:00Z
4
value 0.09896
scoring_system epss
scoring_elements 0.92987
published_at 2026-04-07T12:55:00Z
5
value 0.09896
scoring_system epss
scoring_elements 0.92996
published_at 2026-04-08T12:55:00Z
6
value 0.09896
scoring_system epss
scoring_elements 0.93
published_at 2026-04-09T12:55:00Z
7
value 0.09896
scoring_system epss
scoring_elements 0.93005
published_at 2026-04-11T12:55:00Z
8
value 0.09896
scoring_system epss
scoring_elements 0.93003
published_at 2026-04-12T12:55:00Z
9
value 0.09896
scoring_system epss
scoring_elements 0.93004
published_at 2026-04-13T12:55:00Z
10
value 0.09896
scoring_system epss
scoring_elements 0.93014
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1028
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=566596
reference_id 566596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=566596
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787085
reference_id 787085
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787085
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028
reference_id CVE-2010-1028
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028
5
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-08
reference_id mfsa2010-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-08
fixed_packages
0
url pkg:deb/debian/calibre@2.38.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/calibre@2.38.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@2.38.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-b3vv-xdp2-7ub8
2
vulnerability VCID-bjj5-ynf7-v7aa
3
vulnerability VCID-dywq-dzuv-wka2
4
vulnerability VCID-hgmk-8s7s-tfdb
5
vulnerability VCID-jwpx-aqjh-dqej
6
vulnerability VCID-mqmp-g7uy-gbg4
7
vulnerability VCID-nj3z-4ya4-bqf7
8
vulnerability VCID-vq4p-dvg4-eudz
9
vulnerability VCID-x63d-4kux-cqcu
10
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
5
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
6
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
7
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2010-1028
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6j2-32tf-g7ax
22
url VCID-zhz3-1799-a7hk
vulnerability_id VCID-zhz3-1799-a7hk
summary calibre: Calibre: Arbitrary Code Execution via malicious custom template file during ebook conversion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25731.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25731.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-25731
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01177
published_at 2026-04-18T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01166
published_at 2026-04-16T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00905
published_at 2026-04-02T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.0091
published_at 2026-04-09T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00913
published_at 2026-04-08T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00898
published_at 2026-04-11T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00893
published_at 2026-04-12T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00895
published_at 2026-04-13T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00907
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-25731
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25731
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2437917
reference_id 2437917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2437917
5
reference_url https://github.com/kovidgoyal/calibre/commit/f0649b27512e987b95fcab2e1e0a3bcdafc23379
reference_id f0649b27512e987b95fcab2e1e0a3bcdafc23379
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-02-06T21:01:31Z/
url https://github.com/kovidgoyal/calibre/commit/f0649b27512e987b95fcab2e1e0a3bcdafc23379
6
reference_url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-xrh9-w7qx-3gcc
reference_id GHSA-xrh9-w7qx-3gcc
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-02-06T21:01:31Z/
url https://github.com/kovidgoyal/calibre/security/advisories/GHSA-xrh9-w7qx-3gcc
fixed_packages
0
url pkg:deb/debian/calibre@9.2.0%2Bds%2B~0.10.5-1?distro=trixie
purl pkg:deb/debian/calibre@9.2.0%2Bds%2B~0.10.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.2.0%252Bds%252B~0.10.5-1%3Fdistro=trixie
1
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie
2
url pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
purl pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie
3
url pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
purl pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie
aliases CVE-2026-25731
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhz3-1799-a7hk
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie