The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThis was deemed not a vulnerability.
io.undertow:undertow-core is a Java web server based on non-blocking IO.
Affected versions of this package are vulnerable to Information Exposure via the reuse of HTTP/2 request headers. An attacker can access sensitive information from previous requests by exploiting the incorrect reuse of header values across different streams on the same connection.
Note: The CVE for this vulnerability has been rejected because multiple invocations of the same HpackDecoder
from different threads are required for the vulnerability but such concurrent accesses are not possible, so the issue is not exploitable.