The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Improper Access Control vulnerabilities in an interactive lesson.
Start learningUpgrade ZODB3
to version 3.8.3, 3.9.0c2 or higher.
ZODB3 is a ZODB3 - Meta release for ZODB, persistent, BTrees and ZEO
Affected versions of this package are vulnerable to Improper Access Control due to improper handling of ZEO database sharing and blob support. An attacker can read or delete arbitrary files by exploiting unknown vectors.
Note
This vulnerability is only exploitable when:
Using ZEO to share a database among multiple applications or application instances,
Allowing untrusted clients to connect to your ZEO server, and the ZEO server is configured to support blobs.