The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade RHEL:9
mysql:8.4/mecab-ipadic
to version 0:2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 or higher.
This issue was patched in RHSA-2025:16046
.
Note: Versions mentioned in the description apply only to the upstream mysql:8.4/mecab-ipadic
package and not the mysql:8.4/mecab-ipadic
package as distributed by RHEL
.
See How to fix?
for RHEL:9
relevant fixed versions and status.
Due to a mistake in libcurl's WebSocket code, a malicious server can send a particularly crafted packet which makes libcurl get trapped in an endless busy-loop.
There is no other way for the application to escape or exit this loop other than killing the thread/process.
This might be used to DoS libcurl-using application.