Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/calibre@2.5.0%2Bdfsg-1
Typedeb
Namespacedebian
Namecalibre
Version2.5.0+dfsg-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version8.16.2+ds+~0.10.5-3~bpo13+1
Latest_non_vulnerable_version8.16.2+ds+~0.10.5-3~bpo13+1
Affected_by_vulnerabilities
0
url VCID-4gvv-bsf9-vqca
vulnerability_id VCID-4gvv-bsf9-vqca
summary Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46303
reference_id
reference_type
scores
0
value 0.00567
scoring_system epss
scoring_elements 0.68568
published_at 2026-04-26T12:55:00Z
1
value 0.00567
scoring_system epss
scoring_elements 0.68563
published_at 2026-04-24T12:55:00Z
2
value 0.00567
scoring_system epss
scoring_elements 0.68438
published_at 2026-04-02T12:55:00Z
3
value 0.00567
scoring_system epss
scoring_elements 0.68458
published_at 2026-04-04T12:55:00Z
4
value 0.00567
scoring_system epss
scoring_elements 0.68434
published_at 2026-04-07T12:55:00Z
5
value 0.00567
scoring_system epss
scoring_elements 0.68485
published_at 2026-04-08T12:55:00Z
6
value 0.00567
scoring_system epss
scoring_elements 0.68501
published_at 2026-04-09T12:55:00Z
7
value 0.00567
scoring_system epss
scoring_elements 0.68527
published_at 2026-04-11T12:55:00Z
8
value 0.00567
scoring_system epss
scoring_elements 0.68515
published_at 2026-04-12T12:55:00Z
9
value 0.00567
scoring_system epss
scoring_elements 0.68482
published_at 2026-04-13T12:55:00Z
10
value 0.00567
scoring_system epss
scoring_elements 0.68523
published_at 2026-04-16T12:55:00Z
11
value 0.00567
scoring_system epss
scoring_elements 0.68536
published_at 2026-04-18T12:55:00Z
12
value 0.00567
scoring_system epss
scoring_elements 0.68514
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46303
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46303
2
reference_url https://security.gentoo.org/glsa/202409-04
reference_id GLSA-202409-04
reference_type
scores
url https://security.gentoo.org/glsa/202409-04
3
reference_url https://github.com/0x1717/ssrf-via-img
reference_id ssrf-via-img
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-16T13:24:03Z/
url https://github.com/0x1717/ssrf-via-img
4
reference_url https://github.com/kovidgoyal/calibre/compare/v6.18.1...v6.19.0
reference_id v6.18.1...v6.19.0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-16T13:24:03Z/
url https://github.com/kovidgoyal/calibre/compare/v6.18.1...v6.19.0
fixed_packages
0
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5
aliases CVE-2023-46303
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gvv-bsf9-vqca
1
url VCID-4kgm-mmjn-g3a7
vulnerability_id VCID-4kgm-mmjn-g3a7
summary The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10187
reference_id
reference_type
scores
0
value 0.0039
scoring_system epss
scoring_elements 0.60071
published_at 2026-04-24T12:55:00Z
1
value 0.0039
scoring_system epss
scoring_elements 0.60108
published_at 2026-04-16T12:55:00Z
2
value 0.0039
scoring_system epss
scoring_elements 0.60114
published_at 2026-04-18T12:55:00Z
3
value 0.0039
scoring_system epss
scoring_elements 0.59944
published_at 2026-04-01T12:55:00Z
4
value 0.0039
scoring_system epss
scoring_elements 0.60022
published_at 2026-04-02T12:55:00Z
5
value 0.0039
scoring_system epss
scoring_elements 0.60046
published_at 2026-04-04T12:55:00Z
6
value 0.0039
scoring_system epss
scoring_elements 0.60016
published_at 2026-04-07T12:55:00Z
7
value 0.0039
scoring_system epss
scoring_elements 0.60066
published_at 2026-04-08T12:55:00Z
8
value 0.0039
scoring_system epss
scoring_elements 0.6008
published_at 2026-04-09T12:55:00Z
9
value 0.0039
scoring_system epss
scoring_elements 0.60101
published_at 2026-04-21T12:55:00Z
10
value 0.0039
scoring_system epss
scoring_elements 0.60087
published_at 2026-04-26T12:55:00Z
11
value 0.0039
scoring_system epss
scoring_elements 0.6007
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10187
1
reference_url https://bugs.launchpad.net/calibre/+bug/1651728
reference_id
reference_type
scores
url https://bugs.launchpad.net/calibre/+bug/1651728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10187
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kovidgoyal/calibre/commit/3a89718664cb8c
reference_id
reference_type
scores
url https://github.com/kovidgoyal/calibre/commit/3a89718664cb8c
5
reference_url http://www.openwall.com/lists/oss-security/2017/01/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/29/8
6
reference_url http://www.openwall.com/lists/oss-security/2017/01/31/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/31/9
7
reference_url http://www.securityfocus.com/bid/95909
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95909
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853004
reference_id 853004
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853004
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10187
reference_id CVE-2016-10187
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-10187
fixed_packages
0
url pkg:deb/debian/calibre@2.75.1%2Bdfsg-1
purl pkg:deb/debian/calibre@2.75.1%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4gvv-bsf9-vqca
1
vulnerability VCID-favj-1bjh-9uff
2
vulnerability VCID-pa4n-csyj-wqet
3
vulnerability VCID-xhf1-k7jg-6ued
4
vulnerability VCID-ycp8-ws8x-3qbn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@2.75.1%252Bdfsg-1
aliases CVE-2016-10187
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kgm-mmjn-g3a7
2
url VCID-favj-1bjh-9uff
vulnerability_id VCID-favj-1bjh-9uff
summary calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44686
reference_id
reference_type
scores
0
value 0.00412
scoring_system epss
scoring_elements 0.61347
published_at 2026-04-01T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61424
published_at 2026-04-02T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61452
published_at 2026-04-04T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61423
published_at 2026-04-07T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.6147
published_at 2026-04-08T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.61485
published_at 2026-04-09T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.61506
published_at 2026-04-11T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61493
published_at 2026-04-12T12:55:00Z
8
value 0.00412
scoring_system epss
scoring_elements 0.61473
published_at 2026-04-13T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61512
published_at 2026-04-16T12:55:00Z
10
value 0.00412
scoring_system epss
scoring_elements 0.61517
published_at 2026-04-18T12:55:00Z
11
value 0.00412
scoring_system epss
scoring_elements 0.615
published_at 2026-04-21T12:55:00Z
12
value 0.00412
scoring_system epss
scoring_elements 0.61487
published_at 2026-04-24T12:55:00Z
13
value 0.00412
scoring_system epss
scoring_elements 0.61503
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44686
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44686
fixed_packages
0
url pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5
purl pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-bjj5-ynf7-v7aa
2
vulnerability VCID-dywq-dzuv-wka2
3
vulnerability VCID-hgmk-8s7s-tfdb
4
vulnerability VCID-jwpx-aqjh-dqej
5
vulnerability VCID-mqmp-g7uy-gbg4
6
vulnerability VCID-nj3z-4ya4-bqf7
7
vulnerability VCID-vq4p-dvg4-eudz
8
vulnerability VCID-x63d-4kux-cqcu
9
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5
aliases CVE-2021-44686
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-favj-1bjh-9uff
3
url VCID-pa4n-csyj-wqet
vulnerability_id VCID-pa4n-csyj-wqet
summary Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7009
reference_id
reference_type
scores
0
value 0.08423
scoring_system epss
scoring_elements 0.92354
published_at 2026-04-26T12:55:00Z
1
value 0.08423
scoring_system epss
scoring_elements 0.92338
published_at 2026-04-13T12:55:00Z
2
value 0.08423
scoring_system epss
scoring_elements 0.9235
published_at 2026-04-16T12:55:00Z
3
value 0.08423
scoring_system epss
scoring_elements 0.92349
published_at 2026-04-21T12:55:00Z
4
value 0.08423
scoring_system epss
scoring_elements 0.92353
published_at 2026-04-24T12:55:00Z
5
value 0.08423
scoring_system epss
scoring_elements 0.9231
published_at 2026-04-02T12:55:00Z
6
value 0.08423
scoring_system epss
scoring_elements 0.92315
published_at 2026-04-04T12:55:00Z
7
value 0.08423
scoring_system epss
scoring_elements 0.92318
published_at 2026-04-07T12:55:00Z
8
value 0.08423
scoring_system epss
scoring_elements 0.92329
published_at 2026-04-08T12:55:00Z
9
value 0.08423
scoring_system epss
scoring_elements 0.92334
published_at 2026-04-09T12:55:00Z
10
value 0.08423
scoring_system epss
scoring_elements 0.92339
published_at 2026-04-11T12:55:00Z
11
value 0.08423
scoring_system epss
scoring_elements 0.92341
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7009
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7009
2
reference_url https://starlabs.sg/advisories/24/24-7009/
reference_id 24-7009
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T13:15:35Z/
url https://starlabs.sg/advisories/24/24-7009/
3
reference_url https://github.com/kovidgoyal/calibre/commit/d56574285e8859d3d715eb7829784ee74337b7d7
reference_id d56574285e8859d3d715eb7829784ee74337b7d7
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T13:15:35Z/
url https://github.com/kovidgoyal/calibre/commit/d56574285e8859d3d715eb7829784ee74337b7d7
4
reference_url https://security.gentoo.org/glsa/202409-04
reference_id GLSA-202409-04
reference_type
scores
url https://security.gentoo.org/glsa/202409-04
fixed_packages
0
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-4gvv-bsf9-vqca
2
vulnerability VCID-b3vv-xdp2-7ub8
3
vulnerability VCID-bjj5-ynf7-v7aa
4
vulnerability VCID-dywq-dzuv-wka2
5
vulnerability VCID-favj-1bjh-9uff
6
vulnerability VCID-hgmk-8s7s-tfdb
7
vulnerability VCID-jwpx-aqjh-dqej
8
vulnerability VCID-mqmp-g7uy-gbg4
9
vulnerability VCID-nj3z-4ya4-bqf7
10
vulnerability VCID-vq4p-dvg4-eudz
11
vulnerability VCID-x63d-4kux-cqcu
12
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2
aliases CVE-2024-7009
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pa4n-csyj-wqet
4
url VCID-xhf1-k7jg-6ued
vulnerability_id VCID-xhf1-k7jg-6ued
summary gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7889
reference_id
reference_type
scores
0
value 0.10883
scoring_system epss
scoring_elements 0.93417
published_at 2026-04-26T12:55:00Z
1
value 0.10883
scoring_system epss
scoring_elements 0.93354
published_at 2026-04-01T12:55:00Z
2
value 0.10883
scoring_system epss
scoring_elements 0.93362
published_at 2026-04-02T12:55:00Z
3
value 0.10883
scoring_system epss
scoring_elements 0.9337
published_at 2026-04-07T12:55:00Z
4
value 0.10883
scoring_system epss
scoring_elements 0.93377
published_at 2026-04-08T12:55:00Z
5
value 0.10883
scoring_system epss
scoring_elements 0.93381
published_at 2026-04-09T12:55:00Z
6
value 0.10883
scoring_system epss
scoring_elements 0.93386
published_at 2026-04-13T12:55:00Z
7
value 0.10883
scoring_system epss
scoring_elements 0.93385
published_at 2026-04-12T12:55:00Z
8
value 0.10883
scoring_system epss
scoring_elements 0.93405
published_at 2026-04-16T12:55:00Z
9
value 0.10883
scoring_system epss
scoring_elements 0.93409
published_at 2026-04-18T12:55:00Z
10
value 0.10883
scoring_system epss
scoring_elements 0.93416
published_at 2026-04-21T12:55:00Z
11
value 0.10883
scoring_system epss
scoring_elements 0.9342
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7889
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7889
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892242
reference_id 892242
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892242
3
reference_url https://security.archlinux.org/ASA-201803-8
reference_id ASA-201803-8
reference_type
scores
url https://security.archlinux.org/ASA-201803-8
4
reference_url https://security.archlinux.org/AVG-650
reference_id AVG-650
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-650
fixed_packages
0
url pkg:deb/debian/calibre@3.39.1%2Bdfsg-3
purl pkg:deb/debian/calibre@3.39.1%2Bdfsg-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4gvv-bsf9-vqca
1
vulnerability VCID-favj-1bjh-9uff
2
vulnerability VCID-pa4n-csyj-wqet
3
vulnerability VCID-ycp8-ws8x-3qbn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@3.39.1%252Bdfsg-3
aliases CVE-2018-7889
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xhf1-k7jg-6ued
5
url VCID-ycp8-ws8x-3qbn
vulnerability_id VCID-ycp8-ws8x-3qbn
summary Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7008
reference_id
reference_type
scores
0
value 0.12708
scoring_system epss
scoring_elements 0.93973
published_at 2026-04-04T12:55:00Z
1
value 0.12708
scoring_system epss
scoring_elements 0.93988
published_at 2026-04-09T12:55:00Z
2
value 0.12708
scoring_system epss
scoring_elements 0.93984
published_at 2026-04-08T12:55:00Z
3
value 0.12708
scoring_system epss
scoring_elements 0.93976
published_at 2026-04-07T12:55:00Z
4
value 0.12708
scoring_system epss
scoring_elements 0.93964
published_at 2026-04-02T12:55:00Z
5
value 0.13396
scoring_system epss
scoring_elements 0.94215
published_at 2026-04-26T12:55:00Z
6
value 0.13396
scoring_system epss
scoring_elements 0.94191
published_at 2026-04-13T12:55:00Z
7
value 0.13396
scoring_system epss
scoring_elements 0.94207
published_at 2026-04-16T12:55:00Z
8
value 0.13396
scoring_system epss
scoring_elements 0.94212
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7008
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7008
2
reference_url https://starlabs.sg/advisories/24/24-7008/
reference_id 24-7008
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:34:54Z/
url https://starlabs.sg/advisories/24/24-7008/
3
reference_url https://github.com/kovidgoyal/calibre/commit/863abac24e7bc3e5ca0b3307362ff1953ba53fe0
reference_id 863abac24e7bc3e5ca0b3307362ff1953ba53fe0
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:34:54Z/
url https://github.com/kovidgoyal/calibre/commit/863abac24e7bc3e5ca0b3307362ff1953ba53fe0
4
reference_url https://security.gentoo.org/glsa/202409-04
reference_id GLSA-202409-04
reference_type
scores
url https://security.gentoo.org/glsa/202409-04
fixed_packages
0
url pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2
purl pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2w1b-b6qm-4qhf
1
vulnerability VCID-4gvv-bsf9-vqca
2
vulnerability VCID-b3vv-xdp2-7ub8
3
vulnerability VCID-bjj5-ynf7-v7aa
4
vulnerability VCID-dywq-dzuv-wka2
5
vulnerability VCID-favj-1bjh-9uff
6
vulnerability VCID-hgmk-8s7s-tfdb
7
vulnerability VCID-jwpx-aqjh-dqej
8
vulnerability VCID-mqmp-g7uy-gbg4
9
vulnerability VCID-nj3z-4ya4-bqf7
10
vulnerability VCID-vq4p-dvg4-eudz
11
vulnerability VCID-x63d-4kux-cqcu
12
vulnerability VCID-zhz3-1799-a7hk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2
aliases CVE-2024-7008
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycp8-ws8x-3qbn
6
url VCID-z6j2-32tf-g7ax
vulnerability_id VCID-z6j2-32tf-g7ax
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1028.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1028
reference_id
reference_type
scores
0
value 0.09896
scoring_system epss
scoring_elements 0.93029
published_at 2026-04-26T12:55:00Z
1
value 0.09896
scoring_system epss
scoring_elements 0.92976
published_at 2026-04-01T12:55:00Z
2
value 0.09896
scoring_system epss
scoring_elements 0.92984
published_at 2026-04-02T12:55:00Z
3
value 0.09896
scoring_system epss
scoring_elements 0.92988
published_at 2026-04-04T12:55:00Z
4
value 0.09896
scoring_system epss
scoring_elements 0.92987
published_at 2026-04-07T12:55:00Z
5
value 0.09896
scoring_system epss
scoring_elements 0.92996
published_at 2026-04-08T12:55:00Z
6
value 0.09896
scoring_system epss
scoring_elements 0.93
published_at 2026-04-09T12:55:00Z
7
value 0.09896
scoring_system epss
scoring_elements 0.93005
published_at 2026-04-11T12:55:00Z
8
value 0.09896
scoring_system epss
scoring_elements 0.93003
published_at 2026-04-12T12:55:00Z
9
value 0.09896
scoring_system epss
scoring_elements 0.93004
published_at 2026-04-13T12:55:00Z
10
value 0.09896
scoring_system epss
scoring_elements 0.93014
published_at 2026-04-16T12:55:00Z
11
value 0.09896
scoring_system epss
scoring_elements 0.93017
published_at 2026-04-18T12:55:00Z
12
value 0.09896
scoring_system epss
scoring_elements 0.93024
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1028
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=566596
reference_id 566596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=566596
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787085
reference_id 787085
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787085
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028
reference_id CVE-2010-1028
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028
5
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-08
reference_id mfsa2010-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-08
fixed_packages
0
url pkg:deb/debian/calibre@2.75.1%2Bdfsg-1~bpo8%2B1
purl pkg:deb/debian/calibre@2.75.1%2Bdfsg-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4gvv-bsf9-vqca
1
vulnerability VCID-4kgm-mmjn-g3a7
2
vulnerability VCID-favj-1bjh-9uff
3
vulnerability VCID-pa4n-csyj-wqet
4
vulnerability VCID-xhf1-k7jg-6ued
5
vulnerability VCID-ycp8-ws8x-3qbn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@2.75.1%252Bdfsg-1~bpo8%252B1
aliases CVE-2010-1028
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6j2-32tf-g7ax
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@2.5.0%252Bdfsg-1