Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

1 – 10 of 31 results


CVE-2024-46292

Medium priority
Needs evaluation

A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the...

1 affected packages

modsecurity

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
modsecurity Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-1019

Medium priority
Needs evaluation

ModSecurity / libModSecurity 3.0.0 to 3.0.11 is affected by a WAF bypass for path-based payloads submitted via specially crafted request URLs. ModSecurity v3 decodes percent-encoded characters present in request URLs before it...

1 affected packages

modsecurity

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
modsecurity Needs evaluation Needs evaluation Needs evaluation Not in release Not in release
Show less packages

CVE-2023-38285

Medium priority
Needs evaluation

Trustwave ModSecurity 3.x before 3.0.10 has Inefficient Algorithmic Complexity.

1 affected packages

modsecurity

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
modsecurity Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
Show less packages

CVE-2023-38199

Medium priority
Needs evaluation

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka...

1 affected packages

modsecurity-crs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
modsecurity-crs Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2023-28882

Medium priority
Needs evaluation

Trustwave ModSecurity 3.0.5 through 3.0.8 before 3.0.9 allows a denial of service (worker crash and unresponsiveness) because some inputs cause a segfault in the Transaction class for some configurations.

1 affected packages

modsecurity

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
modsecurity Needs evaluation Needs evaluation Needs evaluation Not in release Ignored
Show less packages

CVE-2023-24021

Medium priority

Some fixes available 4 of 5

Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read...

1 affected packages

modsecurity-apache

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
modsecurity-apache Fixed Fixed Fixed Fixed
Show less packages

CVE-2022-48279

Medium priority

Some fixes available 5 of 9

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to...

2 affected packages

modsecurity, modsecurity-apache

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
modsecurity Not affected Needs evaluation Needs evaluation Not in release Ignored
modsecurity-apache Not affected Fixed Fixed Fixed Fixed
Show less packages

CVE-2022-39958

Low priority
Needs evaluation

The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass to sequentially exfiltrate small and undetectable sections of data by repeatedly submitting an HTTP Range header field with a small byte range. A...

1 affected packages

modsecurity-crs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
modsecurity-crs Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2022-39957

Low priority
Needs evaluation

The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass. A client can issue an HTTP Accept header field containing an optional "charset" parameter in order to receive the response in an encoded form....

1 affected packages

modsecurity-crs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
modsecurity-crs Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2022-39956

Low priority
Needs evaluation

The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass for HTTP multipart requests by submitting a payload that uses a character encoding scheme via the Content-Type or the...

1 affected packages

modsecurity-crs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
modsecurity-crs Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages