Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-62s7-w8zq-zfg5 |
| Summary | Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution. |
| Aliases |
|
| Fixed_packages |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| Affected_packages |
|
| References |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6782 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.93835 |
| scoring_system |
epss |
| scoring_elements |
0.99865 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.93835 |
| scoring_system |
epss |
| scoring_elements |
0.99863 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.93835 |
| scoring_system |
epss |
| scoring_elements |
0.99864 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.93835 |
| scoring_system |
epss |
| scoring_elements |
0.99866 |
| published_at |
2026-05-07T12:55:00Z |
|
| 4 |
| value |
0.93835 |
| scoring_system |
epss |
| scoring_elements |
0.99868 |
| published_at |
2026-05-14T12:55:00Z |
|
| 5 |
| value |
0.93835 |
| scoring_system |
epss |
| scoring_elements |
0.99867 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
0.93876 |
| scoring_system |
epss |
| scoring_elements |
0.99871 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.93876 |
| scoring_system |
epss |
| scoring_elements |
0.99869 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.93876 |
| scoring_system |
epss |
| scoring_elements |
0.9987 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6782 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
863 |
| name |
Incorrect Authorization |
| description |
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. |
|
|
| Exploits |
| 0 |
| date_added |
null |
| description |
This module exploits a Python code injection vulnerability in the Content Server component of Calibre v6.9.0 - v7.15.0. Once enabled (disabled by default), it will listen in its default configuration on all network interfaces on TCP port 8080 for incoming traffic, and does not require any authentication. The injected payload will get executed in the same context under which Calibre is being executed. |
| required_action |
null |
| due_date |
null |
| notes |
Stability:
- crash-safe
Reliability:
- repeatable-session
SideEffects:
- ioc-in-logs
|
| known_ransomware_campaign_use |
false |
| source_date_published |
2024-07-31 |
| exploit_type |
null |
| platform |
Linux,Unix,Windows |
| source_date_updated |
null |
| data_source |
Metasploit |
| source_url |
https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/misc/calibre_exec.rb |
|
|
| Severity_range_score | 9.8 - 9.8 |
| Exploitability | null |
| Weighted_severity | null |
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-62s7-w8zq-zfg5 |