The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade opensc/opensc
to version 0.24.0-rc1 or higher.
Affected versions of this package are vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer due to the pkcs15-init
enrollment tool. An attacker can exploit multiple memory issues, potentially leading to unauthorized access or disruption of service.
Note:
All of these issues require physical access to the computer at the time user or administrator would be enrolling the cards (generating keys and loading certificates, other card/token management) operations. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs
so they are considered a high-complexity and low-severity. This issue is not exploitable just by using a PKCS#11
module as done in most of the end-user deployments.