{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T19:49:01.494","vulnerabilities":[{"cve":{"id":"CVE-2023-40586","sourceIdentifier":"security-advisories@github.com","published":"2023-08-25T21:15:09.197","lastModified":"2024-11-21T08:19:46.147","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Due to the misuse of `log.Fatalf`, the application using coraza crashed after receiving crafted requests from attackers. The application will immediately crash after receiving a malicious request that triggers an error in `mime.ParseMediaType`. This issue was patched in version 3.0.1.\n"},{"lang":"es","value":"OWASP Coraza WAF es una librería de firewall de aplicaciones web compatible con golang modsecurity. Debido al mal uso de `log.Fatalf`, la aplicación que utiliza coraza se bloquea después de recibir peticiones crafteadas de atacantes. La aplicación se bloquea inmediatamente después de recibir una petición maliciosa que provoca un error en `mime.ParseMediaType`. Este problema ha sido parcheado en la versión 3.0.1.\n"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:coraza:coraza:3.0.0:*:*:*:*:go:*:*","matchCriteriaId":"7966EDCD-F5B7-4439-A2E8-8A4CE1CA250A"}]}]}],"references":[{"url":"https://github.com/corazawaf/coraza/commit/a5239ba3ce839e14d9b4f9486e1b4a403dcade8c","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://github.com/corazawaf/coraza/commit/a5239ba3ce839e14d9b4f9486e1b4a403dcade8c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]}]}}]}