The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/go-resty/resty/v2
to version 2.11.0 or higher.
github.com/go-resty/resty/v2 is a simple HTTP and REST client library for Go (inspired by Ruby rest-client)
Affected versions of this package are vulnerable to Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'). An attacker can disclose the HTTP request body across requests by triggering the race condition when calling sync.Pool.Put
with the same *bytes.Buffer
more than once when request retries are enabled, and a retry occurs. The call to sync.Pool.Get
will then return a bytes.Buffer
that hasn't had bytes.Buffer.Reset
called on it. This buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request.