The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Argument Injection vulnerabilities in an interactive lesson.
Start learningUpgrade electerm to version 3.7.9 or higher.
electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client
Affected versions of this package are vulnerable to Arbitrary Argument Injection via the openFileWithEditor process. An attacker can execute arbitrary commands on the user's system by crafting a malicious filename containing shell metacharacters, which are then passed unsanitized to the system editor when a user attempts to edit a file from an untrusted SSH server. This is only exploitable if the user opens files for editing from an attacker-controlled or compromised SSH server.
This vulnerability can be mitigated by refraining from using the open with system editor or "Edit with custom editor" feature when connected to untrusted SSH servers, using the built-in editor for file viewing, or ensuring connections are only made to trusted servers and validating filenames before editing.