Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/42211?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42211?format=api", "vulnerability_id": "VCID-62s7-w8zq-zfg5", "summary": "Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution.", "aliases": [ { "alias": "CVE-2024-6782" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585396?format=api", "purl": "pkg:deb/debian/calibre@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582189?format=api", "purl": "pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2w1b-b6qm-4qhf" }, { "vulnerability": "VCID-b3vv-xdp2-7ub8" }, { "vulnerability": "VCID-bjj5-ynf7-v7aa" }, { "vulnerability": "VCID-dywq-dzuv-wka2" }, { "vulnerability": "VCID-hgmk-8s7s-tfdb" }, { "vulnerability": "VCID-jwpx-aqjh-dqej" }, { "vulnerability": "VCID-mqmp-g7uy-gbg4" }, { "vulnerability": "VCID-nj3z-4ya4-bqf7" }, { "vulnerability": "VCID-vq4p-dvg4-eudz" }, { "vulnerability": "VCID-x63d-4kux-cqcu" }, { "vulnerability": "VCID-zhz3-1799-a7hk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@5.12.0%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582190?format=api", "purl": "pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582191?format=api", "purl": "pkg:deb/debian/calibre@6.13.0%2Brepack-2%2Bdeb12u5?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2w1b-b6qm-4qhf" }, { "vulnerability": "VCID-bjj5-ynf7-v7aa" }, { "vulnerability": "VCID-dywq-dzuv-wka2" }, { "vulnerability": "VCID-hgmk-8s7s-tfdb" }, { "vulnerability": "VCID-jwpx-aqjh-dqej" }, { "vulnerability": "VCID-mqmp-g7uy-gbg4" }, { "vulnerability": "VCID-nj3z-4ya4-bqf7" }, { "vulnerability": "VCID-vq4p-dvg4-eudz" }, { "vulnerability": "VCID-x63d-4kux-cqcu" }, { "vulnerability": "VCID-zhz3-1799-a7hk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@6.13.0%252Brepack-2%252Bdeb12u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582192?format=api", "purl": "pkg:deb/debian/calibre@7.16.0%2Bds-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@7.16.0%252Bds-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582193?format=api", "purl": "pkg:deb/debian/calibre@8.5.0%2Bds-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2w1b-b6qm-4qhf" }, { "vulnerability": "VCID-bjj5-ynf7-v7aa" }, { "vulnerability": "VCID-dywq-dzuv-wka2" }, { "vulnerability": "VCID-hgmk-8s7s-tfdb" }, { "vulnerability": "VCID-jwpx-aqjh-dqej" }, { "vulnerability": "VCID-mqmp-g7uy-gbg4" }, { "vulnerability": "VCID-nj3z-4ya4-bqf7" }, { "vulnerability": "VCID-vq4p-dvg4-eudz" }, { "vulnerability": "VCID-x63d-4kux-cqcu" }, { "vulnerability": "VCID-zhz3-1799-a7hk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@8.5.0%252Bds-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582194?format=api", "purl": "pkg:deb/debian/calibre@9.5.0%2Bds%2B~0.10.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.5.0%252Bds%252B~0.10.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582195?format=api", "purl": "pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1041946?format=api", "purl": "pkg:deb/debian/calibre@9.6.0%2Bds%2B~0.10.5-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.6.0%252Bds%252B~0.10.5-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062443?format=api", "purl": "pkg:deb/debian/calibre@9.7.0%2Bds%2B~0.10.5-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/calibre@9.7.0%252Bds%252B~0.10.5-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/75981?format=api", "purl": "pkg:ebuild/app-text/calibre@7.16.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/calibre@7.16.0" } ], "affected_packages": [], "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6782", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.93835", "scoring_system": "epss", "scoring_elements": "0.99863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.93835", "scoring_system": "epss", "scoring_elements": "0.99864", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.93876", "scoring_system": "epss", "scoring_elements": "0.99869", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.93876", "scoring_system": "epss", "scoring_elements": "0.9987", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.93876", "scoring_system": "epss", "scoring_elements": "0.99871", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6782" }, { "reference_url": "https://starlabs.sg/advisories/24/24-6782/", "reference_id": "24-6782", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-08-08T20:04:18Z/" } ], "url": "https://starlabs.sg/advisories/24/24-6782/" }, { "reference_url": "https://github.com/kovidgoyal/calibre/commit/38a1bf50d8cd22052ae59c513816706c6445d5e9", "reference_id": "38a1bf50d8cd22052ae59c513816706c6445d5e9", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-08-08T20:04:18Z/" } ], "url": "https://github.com/kovidgoyal/calibre/commit/38a1bf50d8cd22052ae59c513816706c6445d5e9" }, { "reference_url": "https://security.gentoo.org/glsa/202409-04", "reference_id": "GLSA-202409-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-04" } ], "weaknesses": [ { "cwe_id": 863, "name": "Incorrect Authorization", "description": "The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions." } ], "exploits": [ { "date_added": null, "description": "This module exploits a Python code injection vulnerability in the Content Server component of Calibre v6.9.0 - v7.15.0. Once enabled (disabled by default), it will listen in its default configuration on all network interfaces on TCP port 8080 for incoming traffic, and does not require any authentication. The injected payload will get executed in the same context under which Calibre is being executed.", "required_action": null, "due_date": null, "notes": "Stability:\n - crash-safe\nReliability:\n - repeatable-session\nSideEffects:\n - ioc-in-logs\n", "known_ransomware_campaign_use": false, "source_date_published": "2024-07-31", "exploit_type": null, "platform": "Linux,Unix,Windows", "source_date_updated": null, "data_source": "Metasploit", "source_url": "https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/misc/calibre_exec.rb" } ], "severity_range_score": "9.8 - 9.8", "exploitability": null, "weighted_severity": null, "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-62s7-w8zq-zfg5" }