The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/docker/docker/integration/network/macvlan
to version 26.0.2 or higher.
Affected versions of this package are vulnerable to Transmission of Private Resources into a New Sphere ('Resource Leak') due to the misconfiguration of network interfaces where IPv6 is not disabled as expected. This misconfiguration allows for unintended IPv6 communication capabilities on interfaces, including those designated for IPv4-only traffic. An attacker can exploit this to perform activities such as communicating with other hosts on the local network over link-local IPv6 addresses, receiving SLAAC-assigned addresses through router advertisements, and joining IPv6 multicast groups. This increases the attack surface by enabling unexpected network behaviors and potential data exfiltration opportunities. Additionally, malicious router advertisements could be used to divert traffic, creating potential for denial of service or traffic interception.
This vulnerability can be mitigated by disabling IPv6 in the container using --sysctl=net.ipv6.conf.all.disable_ipv6=1
in the docker create
or docker run
command, or equivalently in a compose
file.