Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/modsecurity@3.0.4-2
purl pkg:deb/debian/modsecurity@3.0.4-2
Next non-vulnerable version 3.0.14-1
Latest non-vulnerable version 3.0.14-1
Risk 3.4
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-93qw-yjha-tyce
Aliases:
CVE-2024-1019
ModSecurity / libModSecurity 3.0.0 to 3.0.11 is affected by a WAF bypass for path-based payloads submitted via specially crafted request URLs. ModSecurity v3 decodes percent-encoded characters present in request URLs before it separates the URL path component from the optional query string component. This results in an impedance mismatch versus RFC compliant back-end applications. The vulnerability hides an attack payload in the path component of the URL from WAF rules inspecting it. A back-end may be vulnerable if it uses the path component of request URLs to construct queries. Integrators and users are advised to upgrade to 3.0.12. The ModSecurity v2 release line is not affected by this vulnerability.
3.0.14-1
Affected by 0 other vulnerabilities.
VCID-azf2-ue64-y7eb
Aliases:
CVE-2023-38285
mod_security: DoS Vulnerability in Four Transformations
3.0.9-1+deb12u1
Affected by 1 other vulnerability.
VCID-kg7a-8fqh-mffc
Aliases:
CVE-2021-42717
security update
3.0.9-1+deb12u1
Affected by 1 other vulnerability.
VCID-y8ty-2cp5-y3gm
Aliases:
CVE-2022-48279
mod_security: incorrect parsing of HTTP multipart requests leads to web application firewall bypass
3.0.9-1+deb12u1
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-cq83-mkc9-g3e2 Trustwave ModSecurity 3.0.0 through 3.0.3 allows an attacker to send crafted requests that may, when sent quickly in large volumes, lead to the server becoming slow or unresponsive (Denial of Service) because of a flaw in Transaction::addRequestHeader in transaction.cc. CVE-2019-19886
VCID-gr7r-94ky-x3ck security update CVE-2020-15598
VCID-m634-5nyb-skeu ModSecurity 3.x before 3.0.4 mishandles key-value pair parsing, as demonstrated by a "string index out of range" error and worker-process crash for a "Cookie: =abc" header. CVE-2019-25043

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:14:15.209365+00:00 Debian Importer Affected by VCID-93qw-yjha-tyce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:20:06.249371+00:00 Debian Importer Affected by VCID-y8ty-2cp5-y3gm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:36:21.284537+00:00 Debian Importer Affected by VCID-kg7a-8fqh-mffc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:31:19.609734+00:00 Debian Importer Affected by VCID-azf2-ue64-y7eb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-15T21:59:59.332659+00:00 Debian Oval Importer Fixing VCID-gr7r-94ky-x3ck https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:34:34.329730+00:00 Debian Oval Importer Fixing VCID-cq83-mkc9-g3e2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:35:44.884899+00:00 Debian Oval Importer Fixing VCID-m634-5nyb-skeu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-13T09:06:51.432297+00:00 Debian Importer Affected by VCID-93qw-yjha-tyce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:52.086679+00:00 Debian Importer Affected by VCID-y8ty-2cp5-y3gm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:10:01.546807+00:00 Debian Importer Affected by VCID-kg7a-8fqh-mffc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:10.777667+00:00 Debian Importer Affected by VCID-azf2-ue64-y7eb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T21:38:13.105004+00:00 Debian Oval Importer Fixing VCID-gr7r-94ky-x3ck https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:15:49.904386+00:00 Debian Oval Importer Fixing VCID-cq83-mkc9-g3e2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:23:41.009879+00:00 Debian Oval Importer Fixing VCID-m634-5nyb-skeu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T21:16:15.644894+00:00 Debian Oval Importer Fixing VCID-gr7r-94ky-x3ck https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:03:42.174159+00:00 Debian Importer Affected by VCID-93qw-yjha-tyce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:56:50.893654+00:00 Debian Oval Importer Fixing VCID-cq83-mkc9-g3e2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:07:35.034877+00:00 Debian Importer Affected by VCID-y8ty-2cp5-y3gm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:45:38.155842+00:00 Debian Importer Affected by VCID-kg7a-8fqh-mffc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:08.213346+00:00 Debian Importer Affected by VCID-azf2-ue64-y7eb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T15:18:14.411925+00:00 Debian Oval Importer Fixing VCID-m634-5nyb-skeu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0