The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade armmbed/mbedtls
to version 2.28.1, 3.2.0 or higher.
Affected versions of this package are vulnerable to Buffer Overread when a DTLS server with MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE
in use receives a ClientHello message with a cookie whose declared length exceeds the end of the allocated buffer by up to 255 bytes. This can cause a crash or information disclosure via error output.
Only systems using a non-default MBEDTLS_SSL_IN_CONTENT_LEN
shorter than the 258 bytes allocated by the default mbedtls_ssl_cookie_check()
function are vulnerable.