The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.
Start learningUpgrade io.undertow:undertow-core to version 2.4.0.Beta1 or higher.
io.undertow:undertow-core is a Java web server based on non-blocking IO.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the MultiPartParserDefinition multipart parsing process in MultiPartParserDefinition.java. An attacker can cause multipart/form-data content from an HTTP GET request to be parsed and prematurely written to disk by sending a request that triggers parameter parsing, such as getParameterMap(), leading to resource exhaustion or unwanted persistence of attacker-controlled data.
GET request while multipart/form-data content is present.