The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/cloudflare/cfrpki/cmd/octorpki
to version 1.4.1 or higher.
github.com/cloudflare/cfrpki/cmd/octorpki is a RPKI validator.
Affected versions of this package are vulnerable to Improper Preservation of Permissions. When copying files with rsync
, octorpki
uses the -a
flag 0, which forces rsync
to copy binaries with the SUID
bit set as root
. Since the provided service definition defaults to root, this could allow for a vector, when combined with another vulnerability that causes octorpki
to process a malicious TAL file, for a local privilege escalation.