The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/kyverno/kyverno/pkg/utils/engine
to version 1.13.5, 1.14.0 or higher.
Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel due to improper handling of namespace selectors in the GetNamespaceSelectorsFromNamespaceLister()
function in labels.go
. An attacker can bypass policy rules using malicious requests that omit or manipulate namespace information. If the Kube API Server can be compromised to partially deny service by other means, which notably have not been realistically demonstrated, the SharedIndexInformer
cache can fall behind. This forces an error, which rather than being propagated to the endpoint, is returned as an empty label map.