The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for github.com/mayuresh82/gocast/controller
.
Affected versions of this package are vulnerable to Command Injection when the name
parameter of an app is used to create the label of a new loopback interface.
Note: The name
parameter is limited to a string length of 12 characters due to the limited size of Linux Kernal network interfact labels.
Users are advised to:
Disable the HTTP API or put it behind authentication if it can’t be.
Disable Consul integration if possible.
Check that the file permissions for the configuration file prevent users other than root and the GoCast user from modifying the file.