The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for riot-os/riot
.
Affected versions of this package are vulnerable to Buffer Overflow due to a small typo in the size check within the gcoap_dns_server_proxy_get
function, leading to incorrect length verification of the _proxy
string instead of the _uri
string. This vulnerability could lead to a range of impacts, from denial of service to arbitrary code execution, if the attacker-controlled input crosses a security boundary.
Note:
This flaw, combined with the absence of an explicit size check before data is copied to the cep->req_etag
buffer in the _gcoap_forward_proxy_copy_options
function, allows for the possibility of a buffer overflow if an attacker crafts input that causes optlen
to exceed COAP_ETAG_LENGTH_MAX
.