The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade libvips/libvips
to version 8.17.2 or higher.
Affected versions of this package are vulnerable to Buffer Over-read in the pdfload
process, if compiled with support for PDF input via Poppler. An attacker can cause the application to read beyond the bounds of allocated memory by submitting a specially crafted PDF document with media headers that define a width but not a height.
Note: Using libvips versions compiled with support for PDF input via PDFium or without support for PDF input at all are unaffected.
This vulnerability can be mitigated by blocking the VipsForeignLoadPdf
operation via vips_operation_block_set
or by setting the VIPS_BLOCK_UNTRUSTED
environment variable at runtime.