The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade mitmproxy to version 12.2.2 or higher.
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.
Affected versions of this package are vulnerable to LDAP Injection through the Ldap authentication handler in mitmproxy/addons/proxyauth.py. An attacker can manipulate the LDAP search filter by supplying a crafted username during proxy authentication, causing the server to query unintended directory entries and accept or reject credentials based on attacker-controlled filter syntax.
Note: Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default.