Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/modsecurity@3.0.12-1?distro=trixie
Typedeb
Namespacedebian
Namemodsecurity
Version3.0.12-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.0.14-1
Latest_non_vulnerable_version3.0.14-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-93qw-yjha-tyce
vulnerability_id VCID-93qw-yjha-tyce
summary ModSecurity / libModSecurity 3.0.0 to 3.0.11 is affected by a WAF bypass for path-based payloads submitted via specially crafted request URLs. ModSecurity v3 decodes percent-encoded characters present in request URLs before it separates the URL path component from the optional query string component. This results in an impedance mismatch versus RFC compliant back-end applications. The vulnerability hides an attack payload in the path component of the URL from WAF rules inspecting it. A back-end may be vulnerable if it uses the path component of request URLs to construct queries. Integrators and users are advised to upgrade to 3.0.12. The ModSecurity v2 release line is not affected by this vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1019
reference_id
reference_type
scores
0
value 0.00306
scoring_system epss
scoring_elements 0.53751
published_at 2026-04-07T12:55:00Z
1
value 0.00306
scoring_system epss
scoring_elements 0.53778
published_at 2026-04-04T12:55:00Z
2
value 0.00306
scoring_system epss
scoring_elements 0.53803
published_at 2026-04-08T12:55:00Z
3
value 0.00306
scoring_system epss
scoring_elements 0.53801
published_at 2026-04-09T12:55:00Z
4
value 0.00306
scoring_system epss
scoring_elements 0.53849
published_at 2026-04-11T12:55:00Z
5
value 0.00306
scoring_system epss
scoring_elements 0.53832
published_at 2026-04-12T12:55:00Z
6
value 0.00306
scoring_system epss
scoring_elements 0.53816
published_at 2026-04-13T12:55:00Z
7
value 0.00306
scoring_system epss
scoring_elements 0.53853
published_at 2026-04-16T12:55:00Z
8
value 0.00306
scoring_system epss
scoring_elements 0.53857
published_at 2026-04-18T12:55:00Z
9
value 0.00306
scoring_system epss
scoring_elements 0.53837
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1019
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1019
fixed_packages
0
url pkg:deb/debian/modsecurity@3.0.12-1?distro=trixie
purl pkg:deb/debian/modsecurity@3.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity@3.0.12-1%3Fdistro=trixie
1
url pkg:deb/debian/modsecurity@3.0.14-1?distro=trixie
purl pkg:deb/debian/modsecurity@3.0.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity@3.0.14-1%3Fdistro=trixie
aliases CVE-2024-1019
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-93qw-yjha-tyce
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity@3.0.12-1%3Fdistro=trixie