The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade openssl to version 3.0.20, 3.3.7, 3.4.5, 3.5.6, 3.6.2 or higher.
Affected versions of this package are vulnerable to Out-of-bounds Write via the hexadecimal conversion process of excessively large OCTET STRING values in X.509 certificate extensions such as Subject Key Identifier or Authority Key Identifier. An attacker can cause a crash, execute arbitrary code, or trigger other undefined behavior by supplying a crafted certificate with a very large OCTET STRING value, leading to a heap buffer overflow on 32-bit platforms when the contents are printed or logged.
Note:
This is only exploitable if the application or service processes untrusted X.509 certificates containing OCTET STRING values exceeding 1 Gigabyte on a 32-bit platform.