CVE-2025-47947
- EPSS 0.21%
- Published 21.05.2025 22:15:50
- Last modified 20.06.2025 16:13:40
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions up to and including 2.9.8 are vulnerable to denial of service in one special case (in stable released versions): when the payload'...
CVE-2025-27110
- EPSS 0.07%
- Published 25.02.2025 20:15:37
- Last modified 28.02.2025 13:35:22
Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. A bug that exists only in Libmodsecurity3 vers...
CVE-2024-46292
- EPSS 0.14%
- Published 09.10.2024 16:15:04
- Last modified 17.06.2025 15:49:56
A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentati...
CVE-2023-24021
- EPSS 0.09%
- Published 20.01.2023 19:15:18
- Last modified 02.04.2025 17:15:34
Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection.
CVE-2022-48279
- EPSS 0.51%
- Published 20.01.2023 19:15:17
- Last modified 03.07.2025 20:59:18
In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C l...
CVE-2021-42717
- EPSS 2.22%
- Published 07.12.2021 22:15:06
- Last modified 03.07.2025 20:59:18
ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with nesting tens-of-thousands deep could result in the web server being unable to service legitimate requests. Even a moderately large (e.g., 300KB) HTTP ...
- EPSS 0.84%
- Published 15.04.2014 10:55:11
- Last modified 12.04.2025 10:46:40
apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.
- EPSS 5.38%
- Published 15.07.2013 15:55:01
- Last modified 11.04.2025 00:51:21
The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header...
CVE-2013-1915
- EPSS 4.85%
- Published 25.04.2013 23:55:01
- Last modified 11.04.2025 00:51:21
ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference...
- EPSS 13.67%
- Published 28.12.2012 11:48:44
- Last modified 11.04.2025 00:51:21
The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.