The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade libcurl to version 8.20.0 or higher.
Affected versions of this package are vulnerable to Authentication Bypass by Primary Weakness via the reuse of HTTP Negotiate authenticated connections. An attacker can gain unauthorized access or perform actions with unintended credentials by making an authenticated HTTP(S) request after a Negotiate-authenticated one to the same host, causing the request to be sent over a connection authenticated with different credentials.
This vulnerability can be mitigated by disabling connection reuse using the following libcurl options: set CURLOPT_FRESH_CONNECT to force a new connection for each request, limit the total number of open connections with CURLOPT_MAXCONNECTS, or limit connections per host with CURLMOPT_MAX_HOST_CONNECTIONS when using the curl_multi API.