The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade org.jenkins-ci.main:remoting
to version 3206.3208.v409508a_675ff, 3248.3250.v3277a_8e88c9b_, 3256.3258.v858f3c9a_f69d or higher.
Affected versions of this package are vulnerable to Arbitrary File Read via the ClassLoaderProxy#fetchJar
method due to improper restrictions.
Calls to Channel#preloadJar
by the attacker can result in the agent retrieving files from the controller using ClassLoaderProxy#fetchJar
.
In some cases, exploiting this vulnerability might result in remote code execution.