Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Owasp
Owasp modsecurity |
|
| CPEs | cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Owasp
Owasp modsecurity |
|
| Metrics |
cvssV3_1
|
Thu, 14 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Modsecurity
Modsecurity modsecurity |
|
| Vendors & Products |
Modsecurity
Modsecurity modsecurity |
Tue, 12 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. From 3.0.0 to before 3.0.15, there is an unhandled exception (std::out_of_range) caused by unsigned integer underflow in libmodsecurity3 if the user (administrator) uses a rule any of @verifySSN, @verifyCPF, or @verifySVNR. This vulnerability is fixed in 3.0.15. | |
| Title | ModSecurity: Unsigned integer underflow in @verifySSN / @verifyCPF / @verifySVNR operators | |
| Weaknesses | CWE-191 CWE-248 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T12:34:20.932Z
Reserved: 2026-04-26T11:53:27.706Z
Link: CVE-2026-42268
Updated: 2026-05-14T12:34:11.396Z
Status : Analyzed
Published: 2026-05-12T22:16:34.337
Modified: 2026-05-14T14:49:57.730
Link: CVE-2026-42268
No data.
OpenCVE Enrichment
Updated: 2026-05-13T09:45:09Z