The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade net-imap to version 0.4.24, 0.5.14, 0.6.4 or higher.
Affected versions of this package are vulnerable to CRLF Injection via the handling of raw string arguments in commands such as uid_search, search, uid_fetch, fetch, uid_store, store, and setquota. A user can execute arbitrary IMAP commands by injecting specially crafted input containing CRLF sequences.
This vulnerability can be mitigated by validating string inputs for search criteria and fetch attributes to ensure they do not contain \r or \n characters, hard-coding the store attr argument, restricting user-controlled inputs to a safe enumerated list, and using Kernel#Integer to validate inputs for the setquota limit.