The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade bytecodealliance/wasm-micro-runtime
to version 2.4.2 or higher.
Affected versions of this package are vulnerable to Untrusted Pointer Dereference in the memory.fill
process when the first operand (memory address pointer) is greater than or equal to 2147483648 bytes in LLVM-JIT mode. An attacker can cause the runtime to hang or crash by executing a WebAssembly program with a specially crafted memory.fill
instruction. This is only exploitable if the runtime is operating in LLVM-JIT mode; the issue does not occur in FAST-JIT mode or other runtime tools.