{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","type":"deb","namespace":"debian","name":"modsecurity-apache","version":"2.9.7-1+deb12u2","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.9.9-1","latest_non_vulnerable_version":"2.9.12-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/131942?format=json","vulnerability_id":"VCID-3vdu-xbqh-7ud6","summary":"ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5031","reference_id":"","reference_type":"","scores":[{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.73921","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.73931","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.73956","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.73927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.73962","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.73976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.73999","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.73981","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.73973","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74013","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74014","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74046","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74055","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74072","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74094","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74079","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74135","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.7414","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00795","scoring_system":"epss","scoring_elements":"0.74148","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5031"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930972?format=json","purl":"pkg:deb/debian/modsecurity-apache@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2009-5031"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vdu-xbqh-7ud6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92502?format=json","vulnerability_id":"VCID-4s75-8asy-wyb1","summary":"The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.","references":[{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2013-05/0125.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/bugtraq/2013-05/0125.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2765","reference_id":"","reference_type":"","scores":[{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90192","published_at":"2026-05-16T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90056","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90059","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90071","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90076","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90106","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90116","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90113","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90127","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90137","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90153","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90165","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90159","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90168","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.90181","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05375","scoring_system":"epss","scoring_elements":"0.9019","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2765"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=967615","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=967615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765"},{"reference_url":"https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py"},{"reference_url":"https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba"},{"reference_url":"http://sourceforge.net/mailarchive/message.php?msg_id=30900019","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/mailarchive/message.php?msg_id=30900019"},{"reference_url":"https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES","reference_id":"","reference_type":"","scores":[],"url":"https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES"},{"reference_url":"http://www.modsecurity.org/","reference_id":"","reference_type":"","scores":[],"url":"http://www.modsecurity.org/"},{"reference_url":"http://www.shookalabs.com/","reference_id":"","reference_type":"","scores":[],"url":"http://www.shookalabs.com/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=710217","reference_id":"710217","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=710217"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2765","reference_id":"CVE-2013-2765","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2765"},{"reference_url":"http://packetstormsecurity.com/files/121815/modsecurity_cve_2013_2765_check.py.txt","reference_id":"CVE-2013-2765;OSVDB-93687","reference_type":"exploit","scores":[],"url":"http://packetstormsecurity.com/files/121815/modsecurity_cve_2013_2765_check.py.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/25852.py","reference_id":"CVE-2013-2765;OSVDB-93687","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/25852.py"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930979?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.6.6-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.6.6-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2013-2765"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4s75-8asy-wyb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55702?format=json","vulnerability_id":"VCID-5gw3-jywd-2qb2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5705.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5705","reference_id":"","reference_type":"","scores":[{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74691","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74764","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74771","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74779","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74769","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74805","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74812","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74815","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74821","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.7485","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74874","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74847","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74865","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74918","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74924","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74933","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5705"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1082904","reference_id":"1082904","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1082904"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930980?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.7.7-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.7.7-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2013-5705"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5gw3-jywd-2qb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92395?format=json","vulnerability_id":"VCID-b7s9-yu8p-hbhj","summary":"The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"},{"reference_url":"http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES","reference_id":"","reference_type":"","scores":[],"url":"http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES"},{"reference_url":"http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081","reference_id":"","reference_type":"","scores":[],"url":"http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081"},{"reference_url":"http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081","reference_id":"","reference_type":"","scores":[],"url":"http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4528","reference_id":"","reference_type":"","scores":[{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93684","published_at":"2026-05-15T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.9357","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93578","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93579","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93588","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.9359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93596","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93597","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93623","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93627","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93632","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.9363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93637","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93649","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93659","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93666","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11456","scoring_system":"epss","scoring_elements":"0.93678","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4528"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4528","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4528"},{"reference_url":"http://seclists.org/fulldisclosure/2012/Oct/113","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2012/Oct/113"},{"reference_url":"https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/10/18/14","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/10/18/14"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691146","reference_id":"691146","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691146"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4528","reference_id":"CVE-2012-4528","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4528"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/37949.txt","reference_id":"CVE-2012-4528;OSVDB-86408","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/37949.txt"},{"reference_url":"https://www.securityfocus.com/bid/56096/info","reference_id":"CVE-2012-4528;OSVDB-86408","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/56096/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930977?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.6.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.6.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2012-4528"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b7s9-yu8p-hbhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78727?format=json","vulnerability_id":"VCID-fc2s-mxh1-yfeh","summary":"modsecurity: lacking the complete content in FILES_TMP_CONTENT leads to web application firewall bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24021.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24021.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-24021","reference_id":"","reference_type":"","scores":[{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27297","published_at":"2026-05-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27735","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27684","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27658","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27619","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27565","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27458","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27211","published_at":"2026-05-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27273","published_at":"2026-05-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27294","published_at":"2026-05-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27225","published_at":"2026-05-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27302","published_at":"2026-05-14T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27319","published_at":"2026-05-15T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27729","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27772","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-24021"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24021","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24021"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029329","reference_id":"1029329","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029329"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163615","reference_id":"2163615","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163615"},{"reference_url":"https://github.com/SpiderLabs/ModSecurity/pull/2857","reference_id":"2857","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:17:41Z/"}],"url":"https://github.com/SpiderLabs/ModSecurity/pull/2857"},{"reference_url":"https://github.com/SpiderLabs/ModSecurity/pull/2857/commits/4324f0ac59f8225aa44bc5034df60dbeccd1d334","reference_id":"4324f0ac59f8225aa44bc5034df60dbeccd1d334","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:17:41Z/"}],"url":"https://github.com/SpiderLabs/ModSecurity/pull/2857/commits/4324f0ac59f8225aa44bc5034df60dbeccd1d334"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/","reference_id":"52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:17:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html","reference_id":"msg00023.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:17:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4628","reference_id":"RHSA-2023:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4629","reference_id":"RHSA-2023:4629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4629"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/","reference_id":"SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:17:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/"},{"reference_url":"https://usn.ubuntu.com/6370-1/","reference_id":"USN-6370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6370-1/"},{"reference_url":"https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.7","reference_id":"v2.9.7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:17:41Z/"}],"url":"https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.7"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/","reference_id":"WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:17:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930984?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2023-24021"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fc2s-mxh1-yfeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92350?format=json","vulnerability_id":"VCID-j7n8-xubx-pqfe","summary":"ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2751","reference_id":"","reference_type":"","scores":[{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83373","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83401","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.834","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83424","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83443","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83476","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83506","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83532","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83554","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83573","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83574","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.8359","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83627","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83637","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01943","scoring_system":"epss","scoring_elements":"0.83639","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2751"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678527","reference_id":"678527","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678527"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930976?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.6.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.6.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2012-2751"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j7n8-xubx-pqfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68959?format=json","vulnerability_id":"VCID-k3vz-b9ar-37hq","summary":"mod_security: ModSecurity segmentation fault","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52891.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52891.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-52891","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22163","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22208","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22009","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22022","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23271","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23288","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23396","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23222","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23295","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46345","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46279","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.4622","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46251","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46324","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46341","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46286","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46193","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46258","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-52891"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108715","reference_id":"1108715","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108715"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2375926","reference_id":"2375926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2375926"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/commit/ecd7b9736836eee391d25f35d5bd06a3ce35a45d","reference_id":"ecd7b9736836eee391d25f35d5bd06a3ce35a45d","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T15:24:24Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/commit/ecd7b9736836eee391d25f35d5bd06a3ce35a45d"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-gw9c-4wfm-vj3x","reference_id":"GHSA-gw9c-4wfm-vj3x","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-02T15:24:24Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-gw9c-4wfm-vj3x"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930972?format=json","purl":"pkg:deb/debian/modsecurity-apache@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930990?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2025-52891"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k3vz-b9ar-37hq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90971?format=json","vulnerability_id":"VCID-kg7a-8fqh-mffc","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-42717","reference_id":"","reference_type":"","scores":[{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.84023","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83793","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83817","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83828","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83862","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.8386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83886","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83899","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83922","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83943","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83959","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83958","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.83975","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.84009","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0204","scoring_system":"epss","scoring_elements":"0.8402","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-42717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42717"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://usn.ubuntu.com/6370-1/","reference_id":"USN-6370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6370-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930982?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930981?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2021-42717"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kg7a-8fqh-mffc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68435?format=json","vulnerability_id":"VCID-qrsw-p6vk-pydk","summary":"mod_security: ModSecurity Content-Type Override Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54571.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54571.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-54571","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17146","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17089","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16999","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18548","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1845","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18392","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25177","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2527","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25233","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.272","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27177","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27095","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2711","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27184","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27092","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27156","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-54571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54571"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110480","reference_id":"1110480","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110480"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386666","reference_id":"2386666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386666"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/issues/2514","reference_id":"2514","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-06T20:31:25Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/issues/2514"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/commit/6d7e8eb18f2d7d368fb8e29516fcdeaeb8d349b8","reference_id":"6d7e8eb18f2d7d368fb8e29516fcdeaeb8d349b8","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-06T20:31:25Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/commit/6d7e8eb18f2d7d368fb8e29516fcdeaeb8d349b8"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-cg44-9m43-3f9v","reference_id":"GHSA-cg44-9m43-3f9v","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-06T20:31:25Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-cg44-9m43-3f9v"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930991?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2025-54571"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qrsw-p6vk-pydk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69468?format=json","vulnerability_id":"VCID-sm3m-cydd-w3av","summary":"mod_security: ModSecurity Denial of Service Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48866.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-48866","reference_id":"","reference_type":"","scores":[{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77679","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77951","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77803","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77818","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.7783","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.7786","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77879","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77868","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77886","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77931","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77945","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77706","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77718","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77732","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.7777","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77768","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77762","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77794","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-48866"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48866"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107196","reference_id":"1107196","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107196"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369827","reference_id":"2369827","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369827"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/commit/3a54ccea62d3f7151bb08cb78d60c5e90b53ca2e","reference_id":"3a54ccea62d3f7151bb08cb78d60c5e90b53ca2e","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-02T15:52:43Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/commit/3a54ccea62d3f7151bb08cb78d60c5e90b53ca2e"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r","reference_id":"GHSA-859r-vvv8-rm8r","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-02T15:52:43Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-f82j-8pp7-cw2w","reference_id":"GHSA-f82j-8pp7-cw2w","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-02T15:52:43Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-f82j-8pp7-cw2w"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/wiki/Reference-Manual-(v2.x)#sanitisearg","reference_id":"Reference-Manual-(v2.x)#sanitisearg","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-02T15:52:43Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/wiki/Reference-Manual-(v2.x)#sanitisearg"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12838","reference_id":"RHSA-2025:12838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13670","reference_id":"RHSA-2025:13670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13716","reference_id":"RHSA-2025:13716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13775","reference_id":"RHSA-2025:13775","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13775"},{"reference_url":"https://usn.ubuntu.com/7567-1/","reference_id":"USN-7567-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7567-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930988?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930985?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930989?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2025-48866"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sm3m-cydd-w3av"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69518?format=json","vulnerability_id":"VCID-tyyt-k2cb-dygb","summary":"modsecurity: ModSecurity Has Possible DoS Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47947.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-47947","reference_id":"","reference_type":"","scores":[{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66477","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66503","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66474","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66523","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66537","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66556","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66543","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66547","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66564","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.7003","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.7008","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69984","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69986","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69961","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.70004","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.70034","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.7009","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.70105","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69925","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69975","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-47947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47947"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106286","reference_id":"1106286","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106286"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367903","reference_id":"2367903","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367903"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/pull/3389","reference_id":"3389","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-22T15:51:29Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/pull/3389"},{"reference_url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r","reference_id":"GHSA-859r-vvv8-rm8r","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-22T15:51:29Z/"}],"url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13680","reference_id":"RHSA-2025:13680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13681","reference_id":"RHSA-2025:13681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8605","reference_id":"RHSA-2025:8605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8626","reference_id":"RHSA-2025:8626","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8627","reference_id":"RHSA-2025:8627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8674","reference_id":"RHSA-2025:8674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8674"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8837","reference_id":"RHSA-2025:8837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8844","reference_id":"RHSA-2025:8844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8917","reference_id":"RHSA-2025:8917","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8917"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8922","reference_id":"RHSA-2025:8922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8922"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8937","reference_id":"RHSA-2025:8937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8937"},{"reference_url":"https://usn.ubuntu.com/7567-1/","reference_id":"USN-7567-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7567-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930986?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930985?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930987?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2025-47947"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tyyt-k2cb-dygb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92485?format=json","vulnerability_id":"VCID-y2r9-myqj-yye3","summary":"ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) vulnerability.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101898.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101898.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101911.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101911.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102616.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102616.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1915","reference_id":"","reference_type":"","scores":[{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89645","published_at":"2026-05-16T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89517","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89537","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89541","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.8955","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89564","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89568","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89576","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89594","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89608","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89604","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89614","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04848","scoring_system":"epss","scoring_elements":"0.89634","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1915"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=947842","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=947842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1915"},{"reference_url":"http://secunia.com/advisories/52847","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52847"},{"reference_url":"http://secunia.com/advisories/52977","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52977"},{"reference_url":"https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES"},{"reference_url":"https://github.com/SpiderLabs/ModSecurity/commit/d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/SpiderLabs/ModSecurity/commit/d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe"},{"reference_url":"http://www.debian.org/security/2013/dsa-2659","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2659"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:156","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:156"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/03/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/03/7"},{"reference_url":"http://www.securityfocus.com/bid/58810","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58810"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704625","reference_id":"704625","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704625"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1915","reference_id":"CVE-2013-1915","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1915"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930978?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.6.6-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.6.6-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2013-1915"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y2r9-myqj-yye3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78728?format=json","vulnerability_id":"VCID-y8ty-2cp5-y3gm","summary":"mod_security: incorrect parsing of HTTP multipart requests leads to web application firewall bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48279.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48279.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48279","reference_id":"","reference_type":"","scores":[{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.7075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.71018","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70743","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70788","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70804","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70811","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70841","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70825","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70878","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70887","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70886","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70869","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70909","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70945","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70911","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.7094","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70993","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.71004","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70768","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48279"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48279"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163622","reference_id":"2163622","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163622"},{"reference_url":"https://github.com/SpiderLabs/ModSecurity/pull/2795","reference_id":"2795","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T18:41:41Z/"}],"url":"https://github.com/SpiderLabs/ModSecurity/pull/2795"},{"reference_url":"https://github.com/SpiderLabs/ModSecurity/pull/2797","reference_id":"2797","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T18:41:41Z/"}],"url":"https://github.com/SpiderLabs/ModSecurity/pull/2797"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/","reference_id":"52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T18:41:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/"},{"reference_url":"https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/","reference_id":"crs-version-3-3-3-and-3-2-2-covering-several-cves","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T18:41:41Z/"}],"url":"https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html","reference_id":"msg00023.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T18:41:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4628","reference_id":"RHSA-2023:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4629","reference_id":"RHSA-2023:4629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4629"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/","reference_id":"SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T18:41:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/"},{"reference_url":"https://usn.ubuntu.com/6370-1/","reference_id":"USN-6370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6370-1/"},{"reference_url":"https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6","reference_id":"v2.9.6","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T18:41:41Z/"}],"url":"https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6"},{"reference_url":"https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8","reference_id":"v3.0.8","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T18:41:41Z/"}],"url":"https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/","reference_id":"WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T18:41:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930973?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.3-3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.3-3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930983?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930971?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.7-1%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930975?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.11-1%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.11-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930974?format=json","purl":"pkg:deb/debian/modsecurity-apache@2.9.12-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.12-2%3Fdistro=trixie"}],"aliases":["CVE-2022-48279"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y8ty-2cp5-y3gm"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/modsecurity-apache@2.9.7-1%252Bdeb12u2%3Fdistro=trixie"}