The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade eza
to version 0.18.2 or higher.
eza is a modern, maintained replacement for ls.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the has_dir_name
function in src/libgit2/index.c
. An attacker can cause heap corruption that could be leveraged for arbitrary code execution by triggering two consecutive calls to git_index_add
with a filename that starts with a /
character. This is only exploitable if the bad actor is able to control the ctime
field of the git_index_entry
data structure.
Note:
CVE-2024-25817 is a duplicate of this vulnerability.