Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trustwave
Trustwave modsecurity |
|
| CPEs | cpe:2.3:a:trustwave:modsecurity:3.0.12:*:*:*:*:*:*:* | |
| Vendors & Products |
Trustwave
Trustwave modsecurity |
Mon, 21 Oct 2024 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. | A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue). |
| References |
|
Thu, 10 Oct 2024 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | mod_security: denial of service via name paramter | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 09 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Modsecurity
Modsecurity modsecurity |
|
| Weaknesses | CWE-120 | |
| CPEs | cpe:2.3:a:modsecurity:modsecurity:3.0.12:*:*:*:*:*:*:* | |
| Vendors & Products |
Modsecurity
Modsecurity modsecurity |
|
| Metrics |
cvssV3_1
|
Wed, 09 Oct 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-20T23:47:38.210427
Reserved: 2024-09-11T00:00:00
Link: CVE-2024-46292
Updated: 2024-10-09T16:33:10.372Z
Status : Analyzed
Published: 2024-10-09T16:15:04.373
Modified: 2025-06-17T15:49:56.567
Link: CVE-2024-46292
OpenCVE Enrichment
No data.