Input validation issues were found in Calibre at devices/linux_mount_helper.c which can lead to argument injection and elevation of privileges.
9.8CVSS
9.7AI Score
0.005EPSS
A untrusted search path issue was found in Calibre at devices/linux_mount_helper.c leading to the ability of unprivileged users to execute any program as root.
9.8CVSS
9.4AI Score
0.004EPSS
Race condition issues were found in Calibre at devices/linux_mount_helper.c allowing unprivileged users the ability to mount any device to anywhere.
8.1CVSS
8AI Score
0.004EPSS
The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript.
5.5CVSS
5.2AI Score
0.003EPSS
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
7.8CVSS
7.7AI Score
0.006EPSS
calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py.
7.5CVSS
7.3AI Score
0.002EPSS
link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before 6.19.0 can, by default, add resources outside of the document root.
7.5CVSS
7.5AI Score
0.001EPSS
Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.
7.5CVSS
7.7AI Score
0.004EPSS
Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting.
6.1CVSS
5.3AI Score
0.001EPSS
Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions to perform full-text searches to achieve SQL injection on the SQLite database.
7.1CVSS
5.2AI Score
0.0005EPSS