The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade openjdk-jre
to version 8.421, 11.0.24, 17.0.12, 21.0.4, 22.0.2 or higher.
openjdk-jre is a free and open-source implementation of the Java Platform, Standard Edition (Java SE).
Affected versions of this package are vulnerable to Loop with Unreachable Exit Condition ('Infinite Loop') due to excessive symbol length. An attacker can cause the application to enter an infinite loop by manipulating input data to include overly long symbols.
Exploiting this vulnerability is possible by using the Hotspot
APIs through a web service which supplies data to this API.
This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.