Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-k3vz-b9ar-37hq
Summarymod_security: ModSecurity segmentation fault
Aliases
0
alias CVE-2025-52891
Fixed_packages
0
url pkg:deb/debian/modsecurity-apache@0?distro=trixie
purl pkg:deb/debian/modsecurity-apache@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@0%3Fdistro=trixie
1
url pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/modsecurity-apache@2.9.11-1?distro=trixie
purl pkg:deb/debian/modsecurity-apache@2.9.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%3Fdistro=trixie
4
url pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie
purl pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52891.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-52891
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22163
published_at 2026-04-21T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22208
published_at 2026-04-18T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23396
published_at 2026-04-02T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23345
published_at 2026-04-09T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23365
published_at 2026-04-11T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23328
published_at 2026-04-12T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23271
published_at 2026-04-13T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23288
published_at 2026-04-16T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23437
published_at 2026-04-04T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23222
published_at 2026-04-07T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23295
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-52891
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108715
reference_id 1108715
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108715
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2375926
reference_id 2375926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2375926
5
reference_url https://github.com/owasp-modsecurity/ModSecurity/commit/ecd7b9736836eee391d25f35d5bd06a3ce35a45d
reference_id ecd7b9736836eee391d25f35d5bd06a3ce35a45d
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T15:24:24Z/
url https://github.com/owasp-modsecurity/ModSecurity/commit/ecd7b9736836eee391d25f35d5bd06a3ce35a45d
6
reference_url https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-gw9c-4wfm-vj3x
reference_id GHSA-gw9c-4wfm-vj3x
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T15:24:24Z/
url https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-gw9c-4wfm-vj3x
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score4.3 - 7.5
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-k3vz-b9ar-37hq