The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for riot-os/riot
.
Affected versions of this package are vulnerable to Buffer Overflow due to the reliance on assertions that are not present in non-debug builds, an attacker can write past the end of a fixed-length buffer by providing a larger len
value than expected. This vulnerability arises in the context where assertions, intended as a safeguard against untrusted input, are omitted, leading to insufficient input validation. Specifically, in the nimble_scanlist_update
function, the len
parameter is checked through an assertion and then used in a memcpy()
operation. If an attacker supplies a len
value that exceeds the buffer size while assertions are disabled, it could result in writing outside the bounds of the e->ad
buffer. This scenario opens up the possibility for various malicious outcomes, ranging from causing a denial of service to executing arbitrary code, depending on the nature of the overflow and the attacker's intent. This issue remains unaddressed, and users are encouraged to implement manual len
checks as a temporary countermeasure.
This vulnerability can be mitigated by adding manual len
checking to ensure that the length does not exceed the expected bounds before performing memory operations.