| 0 |
| url |
VCID-1uhd-3upf-nqbu |
| vulnerability_id |
VCID-1uhd-3upf-nqbu |
| summary |
Race condition issues were found in Calibre at devices/linux_mount_helper.c allowing unprivileged users the ability to mount any device to anywhere. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4126 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65296 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65345 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65371 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65336 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65388 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65399 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65418 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65405 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65378 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65414 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65425 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.6541 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65426 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4126 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4126
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1uhd-3upf-nqbu |
|
| 1 |
| url |
VCID-2w1b-b6qm-4qhf |
| vulnerability_id |
VCID-2w1b-b6qm-4qhf |
| summary |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a Server-Side Request Forgery vulnerability in the background-image endpoint of calibre e-book reader's web view allows an attacker to perform blind GET requests to arbitrary URLs and exfiltrate information out from the ebook sandbox. Version 9.6.0 patches the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33205 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02184 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02207 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02154 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0216 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02155 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02172 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02151 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02136 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02132 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02107 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02119 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33205 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33205
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2w1b-b6qm-4qhf |
|
| 2 |
| url |
VCID-4gvv-bsf9-vqca |
| vulnerability_id |
VCID-4gvv-bsf9-vqca |
| summary |
Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46303 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68563 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68514 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68438 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68458 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68434 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68485 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68501 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68527 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68515 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68482 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68523 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68536 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46303 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46303
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4gvv-bsf9-vqca |
|
| 3 |
| url |
VCID-4kgm-mmjn-g3a7 |
| vulnerability_id |
VCID-4kgm-mmjn-g3a7 |
| summary |
The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-10187 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60071 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60108 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60114 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.59944 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60022 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60046 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60016 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60066 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.6008 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60101 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60087 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.6007 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-10187 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-10187
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4kgm-mmjn-g3a7 |
|
| 4 |
| url |
VCID-62s7-w8zq-zfg5 |
| vulnerability_id |
VCID-62s7-w8zq-zfg5 |
| summary |
Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6782 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.93835 |
| scoring_system |
epss |
| scoring_elements |
0.99863 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.93835 |
| scoring_system |
epss |
| scoring_elements |
0.99865 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.93835 |
| scoring_system |
epss |
| scoring_elements |
0.99864 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.93876 |
| scoring_system |
epss |
| scoring_elements |
0.9987 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.93876 |
| scoring_system |
epss |
| scoring_elements |
0.99869 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.93876 |
| scoring_system |
epss |
| scoring_elements |
0.99871 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6782 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-6782
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-62s7-w8zq-zfg5 |
|
| 5 |
| url |
VCID-b3vv-xdp2-7ub8 |
| vulnerability_id |
VCID-b3vv-xdp2-7ub8 |
| summary |
calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-64486 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09639 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09542 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09652 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09668 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.097 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09687 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09566 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11904 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11816 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11934 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16849 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16906 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-64486 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-64486
|
| risk_score |
4.2 |
| exploitability |
0.5 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b3vv-xdp2-7ub8 |
|
| 6 |
| url |
VCID-bjj5-ynf7-v7aa |
| vulnerability_id |
VCID-bjj5-ynf7-v7aa |
| summary |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting existing files. This can lead to potential code execution and Denial of Service through file corruption. This issue has been fixed in version 9.3.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26065 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11314 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11246 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11247 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11374 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11454 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11513 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.113 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11382 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11441 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11446 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11413 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11384 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26065 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-26065
|
| risk_score |
4.2 |
| exploitability |
0.5 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bjj5-ynf7-v7aa |
|
| 7 |
| url |
VCID-dywq-dzuv-wka2 |
| vulnerability_id |
VCID-dywq-dzuv-wka2 |
| summary |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33206 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01707 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01693 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01609 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01616 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01618 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01625 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01611 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01602 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01601 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01589 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01603 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33206 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33206
|
| risk_score |
3.7 |
| exploitability |
0.5 |
| weighted_severity |
7.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dywq-dzuv-wka2 |
|
| 8 |
| url |
VCID-favj-1bjh-9uff |
| vulnerability_id |
VCID-favj-1bjh-9uff |
| summary |
calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44686 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61347 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61424 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61452 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61423 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.6147 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61485 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61506 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61493 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61473 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61512 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61517 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.615 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61487 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44686 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-44686
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-favj-1bjh-9uff |
|
| 9 |
| url |
VCID-hgmk-8s7s-tfdb |
| vulnerability_id |
VCID-hgmk-8s7s-tfdb |
| summary |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by any authenticated user and can also be triggered by tricking an authenticated victim into clicking a crafted link. Version 9.4.0 contains a fix for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-27810 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16231 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16338 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16461 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16523 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16319 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16404 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16463 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16448 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16409 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16346 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16283 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16303 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-27810 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-27810
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hgmk-8s7s-tfdb |
|
| 10 |
| url |
VCID-jwpx-aqjh-dqej |
| vulnerability_id |
VCID-jwpx-aqjh-dqej |
| summary |
calibre: Calibre: Remote Code Execution via path traversal in CHM reader |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25635 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24132 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24023 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.2417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23956 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24069 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24087 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24043 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23986 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26194 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26254 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26229 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26119 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25635 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-25635
|
| risk_score |
3.9 |
| exploitability |
0.5 |
| weighted_severity |
7.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jwpx-aqjh-dqej |
|
| 11 |
| url |
VCID-mqmp-g7uy-gbg4 |
| vulnerability_id |
VCID-mqmp-g7uy-gbg4 |
| summary |
calibre: Calibre: Arbitrary file write via crafted RocketBook (.rb) file |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30853 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0217 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02194 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02176 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02171 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02172 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02154 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02151 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02664 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02672 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05207 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07263 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30853 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-30853
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mqmp-g7uy-gbg4 |
|
| 12 |
| url |
VCID-nj3z-4ya4-bqf7 |
| vulnerability_id |
VCID-nj3z-4ya4-bqf7 |
| summary |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without any validation or trusted-proxy configuration, an attacker can bypass IP-based bans by simply changing or adding this header, rendering the brute-force protection completely ineffective. This is particularly dangerous for calibre servers exposed to the internet, where brute-force protection is the primary defense against credential stuffing and password guessing attacks. Version 9.4.0 contains a fix for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-27824 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0544 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05368 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05461 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05398 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05405 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.077 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07605 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07756 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07722 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07707 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07692 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07617 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-27824 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-27824
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nj3z-4ya4-bqf7 |
|
| 13 |
| url |
VCID-pa4n-csyj-wqet |
| vulnerability_id |
VCID-pa4n-csyj-wqet |
| summary |
Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7009 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.92353 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.92341 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.92338 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.9235 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.92349 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.9231 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.92315 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.92318 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.92329 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.92334 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.08423 |
| scoring_system |
epss |
| scoring_elements |
0.92339 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7009 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-7009
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pa4n-csyj-wqet |
|
| 14 |
| url |
VCID-qsbr-up7k-kbcr |
| vulnerability_id |
VCID-qsbr-up7k-kbcr |
| summary |
Input validation issues were found in Calibre at devices/linux_mount_helper.c which can lead to argument injection and elevation of privileges. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4124 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70153 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70165 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70182 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.7016 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70207 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70221 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70245 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.7023 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70217 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70259 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70268 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70247 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00627 |
| scoring_system |
epss |
| scoring_elements |
0.70299 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4124 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4124
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qsbr-up7k-kbcr |
|
| 15 |
|
| 16 |
| url |
VCID-stnm-9pm7-gqbv |
| vulnerability_id |
VCID-stnm-9pm7-gqbv |
| summary |
A untrusted search path issue was found in Calibre at devices/linux_mount_helper.c leading to the ability of unprivileged users to execute any program as root. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72756 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72764 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72784 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.7276 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72798 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72812 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72836 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72819 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72811 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72852 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72863 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72855 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72896 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4125 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4125
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-stnm-9pm7-gqbv |
|
| 17 |
| url |
VCID-vq4p-dvg4-eudz |
| vulnerability_id |
VCID-vq4p-dvg4-eudz |
| summary |
calibre: Calibre: Arbitrary file corruption via path traversal in EPUB conversion |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25636 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06003 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05948 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05981 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05964 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06041 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06031 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06022 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06014 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07061 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07085 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07162 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07192 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25636 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-25636
|
| risk_score |
3.7 |
| exploitability |
0.5 |
| weighted_severity |
7.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vq4p-dvg4-eudz |
|
| 18 |
| url |
VCID-x63d-4kux-cqcu |
| vulnerability_id |
VCID-x63d-4kux-cqcu |
| summary |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows, this leads to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. Function extract_pictures only checks startswith('Pictures'), and does not sanitize '..' sequences. calibre's own ZipFile.extractall() in utils/zipfile.py does sanitize '..' via _get_targetpath(), but extract_pictures() bypasses this by using manual zf.read() + open(). This issue has been fixed in version 9.3.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26064 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20482 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20608 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20605 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20596 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20787 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20846 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.2056 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20636 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20698 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20718 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20675 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20622 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26064 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-26064
|
| risk_score |
4.2 |
| exploitability |
0.5 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x63d-4kux-cqcu |
|
| 19 |
| url |
VCID-xhf1-k7jg-6ued |
| vulnerability_id |
VCID-xhf1-k7jg-6ued |
| summary |
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7889 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.9342 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93354 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93362 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.9337 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93377 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93381 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93386 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93385 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93405 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93409 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93416 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7889 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7889
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xhf1-k7jg-6ued |
|
| 20 |
| url |
VCID-ycp8-ws8x-3qbn |
| vulnerability_id |
VCID-ycp8-ws8x-3qbn |
| summary |
Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7008 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12708 |
| scoring_system |
epss |
| scoring_elements |
0.93973 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.12708 |
| scoring_system |
epss |
| scoring_elements |
0.93988 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.12708 |
| scoring_system |
epss |
| scoring_elements |
0.93984 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.12708 |
| scoring_system |
epss |
| scoring_elements |
0.93976 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.12708 |
| scoring_system |
epss |
| scoring_elements |
0.93964 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.13396 |
| scoring_system |
epss |
| scoring_elements |
0.94215 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.13396 |
| scoring_system |
epss |
| scoring_elements |
0.94191 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.13396 |
| scoring_system |
epss |
| scoring_elements |
0.94207 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.13396 |
| scoring_system |
epss |
| scoring_elements |
0.94212 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7008 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-7008
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ycp8-ws8x-3qbn |
|
| 21 |
| url |
VCID-z6j2-32tf-g7ax |
| vulnerability_id |
VCID-z6j2-32tf-g7ax |
| summary |
Multiple vulnerabilities have been found in Mozilla Firefox,
Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
allow execution of arbitrary code or local privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1028 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.93029 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.92976 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.92984 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.92988 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.92987 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.92996 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.93 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.93005 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.93003 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.93004 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.93014 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.93017 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.09896 |
| scoring_system |
epss |
| scoring_elements |
0.93024 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1028 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-1028
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z6j2-32tf-g7ax |
|
| 22 |
| url |
VCID-zhz3-1799-a7hk |
| vulnerability_id |
VCID-zhz3-1799-a7hk |
| summary |
calibre: Calibre: Arbitrary Code Execution via malicious custom template file during ebook conversion |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25731 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01251 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01166 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01177 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01247 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00895 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00905 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00907 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0091 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00913 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00898 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00893 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25731 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-25731
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zhz3-1799-a7hk |
|