The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade mio
to version 0.8.11 or higher.
mio is a lightweight non-blocking IO.
Affected versions of this package are vulnerable to Improper Handling of Invalid Use of Special Elements due to the return of invalid tokens that correspond to named pipes that have already been deregistered from the registry. For applications that store pointers in the tokens, this vulnerability may result in a use-after-free.
Notes:
For some applications, invalid tokens may be ignored or cause a warning or a crash.
For users of Tokio, this vulnerability is serious and can result in a use-after-free in Tokio.
The vulnerability is Windows-specific, and can only happen if you are using named pipes. Other IO resources are not affected.