The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade xorg-server
to version 21.1.12 or higher.
Affected versions of this package are vulnerable to Buffer Over-read due to the ProcAppleDRICreatePixmap
function. An attacker can cause memory leakage and segmentation faults by triggering byte-swapped length values in replies, leading to the X server reading heap memory values and transmitting them back to the client until an unmapped page is encountered, resulting in a crash. Although the attacker cannot control the specific memory copied into the replies, the use of small length values typically stored in a 32-bit integer can cause significant attempted out-of-bounds reads.
Note
This function is only found in the Xquartz server for MacOS systems, and not in Xwayland, Xorg, or any other X servers.