The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade ai.djl:api
to version 0.31.1 or higher.
Affected versions of this package are vulnerable to Absolute Path Traversal via the ZipUtils.unzip
and TarUtils.untar
functionalities. An attacker could gain SSH access by injecting an SSH key into the authorized_keys
file, or upload HTML files to leverage cross-site scripting issues. Specifically, it is possible to create an archive on a Windows system, and when extracted on a MacOS or Linux system, write artifacts outside the intended destination during the extraction process. The reverse is also true for archives created on MacOS/Linux systems and extracted on Windows systems.
This can be mitigated by not using model archive files from untrusted sources.