The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Interpretation Conflict vulnerabilities in an interactive lesson.
Start learningUpgrade uv
to version 0.8.6 or higher.
uv is an An extremely fast Python package and project manager, written in Rust.
Affected versions of this package are vulnerable to Interpretation Conflict via improper handling of ZIP archives during the installation process. An attacker can cause malicious code to be executed by crafting a ZIP archive with multiple local file entries or stacked internal ZIPs that are parsed differently by various installers. This can be exploited when a user installs a package from a malicious ZIP archive and subsequently imports or executes the installed package.
Note:
This is only exploitable if a user installs a package from an attacker-controlled ZIP archive and performs an action that triggers code execution, such as importing the package.