The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade xorg-server
to version 21.1.12 or higher.
Affected versions of this package are vulnerable to Buffer Over-read due to the ProcXIPassiveGrabDevice
function. An attacker can cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash by using byte-swapped length values in replies. This could potentially lead to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.