Lookup for vulnerable packages by Package URL.

Purlpkg:gem/rack@0.4
Typegem
Namespace
Namerack
Version0.4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.2.22
Latest_non_vulnerable_version3.2.6
Affected_by_vulnerabilities
0
url VCID-7zgg-tvu3-r7gt
vulnerability_id VCID-7zgg-tvu3-r7gt
summary
Rack vulnerable to ReDoS in content type parsing (2nd degree polynomial)
### Summary

```ruby
module Rack
  class MediaType
    SPLIT_PATTERN = %r{\s*[;,]\s*}
```
The above regexp is subject to ReDos. 50K blank characters as a prefix to the header will take over 10s to split.

### PoC

A simple HTTP request with lots of blank characters in the content-type header:

```ruby
request["Content-Type"] = (" " * 50_000) + "a,"
```

### Impact

It's a very easy to craft ReDoS. Like all ReDoS the impact is debatable.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25126.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25126
reference_id
reference_type
scores
0
value 0.00371
scoring_system epss
scoring_elements 0.58911
published_at 2026-04-21T12:55:00Z
1
value 0.00371
scoring_system epss
scoring_elements 0.58933
published_at 2026-04-18T12:55:00Z
2
value 0.00371
scoring_system epss
scoring_elements 0.58932
published_at 2026-04-11T12:55:00Z
3
value 0.00371
scoring_system epss
scoring_elements 0.58895
published_at 2026-04-13T12:55:00Z
4
value 0.00371
scoring_system epss
scoring_elements 0.58915
published_at 2026-04-12T12:55:00Z
5
value 0.00371
scoring_system epss
scoring_elements 0.58929
published_at 2026-04-16T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63689
published_at 2026-04-09T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63621
published_at 2026-04-07T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63673
published_at 2026-04-08T12:55:00Z
9
value 0.00463
scoring_system epss
scoring_elements 0.64281
published_at 2026-04-04T12:55:00Z
10
value 0.00463
scoring_system epss
scoring_elements 0.64253
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25126
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146
5
reference_url https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/
url https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/rack/rack
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack
8
reference_url https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/
url https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462
9
reference_url https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/
url https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49
10
reference_url https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/
url https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx
11
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml
12
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-25126
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-25126
14
reference_url https://security.netapp.com/advisory/ntap-20240510-0005
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240510-0005
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516
reference_id 1064516
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2265593
reference_id 2265593
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2265593
17
reference_url https://github.com/advisories/GHSA-22f2-v57c-j9cx
reference_id GHSA-22f2-v57c-j9cx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-22f2-v57c-j9cx
18
reference_url https://security.netapp.com/advisory/ntap-20240510-0005/
reference_id ntap-20240510-0005
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/
url https://security.netapp.com/advisory/ntap-20240510-0005/
19
reference_url https://access.redhat.com/errata/RHSA-2024:10806
reference_id RHSA-2024:10806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10806
20
reference_url https://access.redhat.com/errata/RHSA-2024:1841
reference_id RHSA-2024:1841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1841
21
reference_url https://access.redhat.com/errata/RHSA-2024:1846
reference_id RHSA-2024:1846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1846
22
reference_url https://access.redhat.com/errata/RHSA-2024:2007
reference_id RHSA-2024:2007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2007
23
reference_url https://access.redhat.com/errata/RHSA-2024:2113
reference_id RHSA-2024:2113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2113
24
reference_url https://access.redhat.com/errata/RHSA-2024:2581
reference_id RHSA-2024:2581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2581
25
reference_url https://access.redhat.com/errata/RHSA-2024:2584
reference_id RHSA-2024:2584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2584
26
reference_url https://access.redhat.com/errata/RHSA-2024:2953
reference_id RHSA-2024:2953
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2953
27
reference_url https://access.redhat.com/errata/RHSA-2024:3431
reference_id RHSA-2024:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3431
28
reference_url https://usn.ubuntu.com/6837-1/
reference_id USN-6837-1
reference_type
scores
url https://usn.ubuntu.com/6837-1/
29
reference_url https://usn.ubuntu.com/6837-2/
reference_id USN-6837-2
reference_type
scores
url https://usn.ubuntu.com/6837-2/
30
reference_url https://usn.ubuntu.com/7036-1/
reference_id USN-7036-1
reference_type
scores
url https://usn.ubuntu.com/7036-1/
fixed_packages
0
url pkg:gem/rack@2.2.8.1
purl pkg:gem/rack@2.2.8.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-47ja-djzb-2bbw
1
vulnerability VCID-7p12-ejdu-uqgy
2
vulnerability VCID-7wvj-9h3p-23am
3
vulnerability VCID-9rpp-9xss-duf6
4
vulnerability VCID-azu5-jcmd-3ufx
5
vulnerability VCID-c5sc-7qnn-mkb9
6
vulnerability VCID-d58r-22kr-9bct
7
vulnerability VCID-gdhf-e8q1-kbat
8
vulnerability VCID-npag-sz7d-v7b6
9
vulnerability VCID-s971-gkdg-jkhc
10
vulnerability VCID-skxv-7he3-xqgc
11
vulnerability VCID-w732-52bx-2qf8
12
vulnerability VCID-wt7k-s1yd-nke6
13
vulnerability VCID-xazq-qrm1-9ff6
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@2.2.8.1
1
url pkg:gem/rack@3.0.9.1
purl pkg:gem/rack@3.0.9.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-47ja-djzb-2bbw
1
vulnerability VCID-7p12-ejdu-uqgy
2
vulnerability VCID-7wvj-9h3p-23am
3
vulnerability VCID-9rpp-9xss-duf6
4
vulnerability VCID-azu5-jcmd-3ufx
5
vulnerability VCID-c5sc-7qnn-mkb9
6
vulnerability VCID-d58r-22kr-9bct
7
vulnerability VCID-npag-sz7d-v7b6
8
vulnerability VCID-s971-gkdg-jkhc
9
vulnerability VCID-skxv-7he3-xqgc
10
vulnerability VCID-w732-52bx-2qf8
11
vulnerability VCID-wt7k-s1yd-nke6
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.9.1
aliases CVE-2024-25126, GHSA-22f2-v57c-j9cx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7zgg-tvu3-r7gt
1
url VCID-91xe-ev7t-akb9
vulnerability_id VCID-91xe-ev7t-akb9
summary
Uncontrolled Resource Consumption
lib/rack/multipart.rb in Rack  uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
references
0
reference_url http://rack.github.com/
reference_id
reference_type
scores
url http://rack.github.com/
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0544.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0544.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0548.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0548.html
3
reference_url https://access.redhat.com/errata/RHSA-2013:0544
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2013:0544
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6109.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6109.json
5
reference_url https://access.redhat.com/security/cve/CVE-2012-6109
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2012-6109
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6109
reference_id
reference_type
scores
0
value 0.00828
scoring_system epss
scoring_elements 0.74542
published_at 2026-04-18T12:55:00Z
1
value 0.00828
scoring_system epss
scoring_elements 0.7445
published_at 2026-04-01T12:55:00Z
2
value 0.00828
scoring_system epss
scoring_elements 0.74454
published_at 2026-04-02T12:55:00Z
3
value 0.00828
scoring_system epss
scoring_elements 0.7448
published_at 2026-04-04T12:55:00Z
4
value 0.00828
scoring_system epss
scoring_elements 0.74455
published_at 2026-04-07T12:55:00Z
5
value 0.00828
scoring_system epss
scoring_elements 0.74487
published_at 2026-04-08T12:55:00Z
6
value 0.00828
scoring_system epss
scoring_elements 0.74503
published_at 2026-04-09T12:55:00Z
7
value 0.00828
scoring_system epss
scoring_elements 0.74524
published_at 2026-04-11T12:55:00Z
8
value 0.00828
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-12T12:55:00Z
9
value 0.00828
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-13T12:55:00Z
10
value 0.00828
scoring_system epss
scoring_elements 0.74535
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6109
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=895277
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=895277
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6109
9
reference_url https://github.com/rack/rack
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack
10
reference_url https://github.com/rack/rack/blob/master/README.rdoc
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/blob/master/README.rdoc
11
reference_url https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5
12
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2012-6109.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2012-6109.yml
13
reference_url https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ
14
reference_url https://groups.google.com/forum/#!msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ
15
reference_url https://rhn.redhat.com/errata/RHSA-2013-0544.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2013-0544.html
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698440
reference_id 698440
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698440
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.9.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6109
reference_id CVE-2012-6109
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-6109
43
reference_url https://github.com/advisories/GHSA-h77x-m5q8-c29h
reference_id GHSA-h77x-m5q8-c29h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h77x-m5q8-c29h
44
reference_url https://security.gentoo.org/glsa/201405-10
reference_id GLSA-201405-10
reference_type
scores
url https://security.gentoo.org/glsa/201405-10
fixed_packages
0
url pkg:gem/rack@1.1.4
purl pkg:gem/rack@1.1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35e6-cpn8-w7h1
1
vulnerability VCID-3ycr-9smk-uqdc
2
vulnerability VCID-47ja-djzb-2bbw
3
vulnerability VCID-7p12-ejdu-uqgy
4
vulnerability VCID-7wvj-9h3p-23am
5
vulnerability VCID-7zgg-tvu3-r7gt
6
vulnerability VCID-8zkw-y3yd-yuft
7
vulnerability VCID-91xe-ev7t-akb9
8
vulnerability VCID-9rpp-9xss-duf6
9
vulnerability VCID-9uh8-upzm-7bgd
10
vulnerability VCID-arac-j5h5-zkcu
11
vulnerability VCID-azu5-jcmd-3ufx
12
vulnerability VCID-c21j-snf1-d3cb
13
vulnerability VCID-c5sc-7qnn-mkb9
14
vulnerability VCID-d58r-22kr-9bct
15
vulnerability VCID-fpg2-nhey-rkcc
16
vulnerability VCID-gdhf-e8q1-kbat
17
vulnerability VCID-gtzk-m9rm-57hw
18
vulnerability VCID-jxws-ws21-4uaa
19
vulnerability VCID-npag-sz7d-v7b6
20
vulnerability VCID-s971-gkdg-jkhc
21
vulnerability VCID-skxv-7he3-xqgc
22
vulnerability VCID-udc4-7jnt-y3fu
23
vulnerability VCID-vkrw-y1j6-6fe7
24
vulnerability VCID-w732-52bx-2qf8
25
vulnerability VCID-wt7k-s1yd-nke6
26
vulnerability VCID-xazq-qrm1-9ff6
27
vulnerability VCID-xkah-9nv9-wufd
28
vulnerability VCID-xnz5-gv2x-17bk
29
vulnerability VCID-y12d-fjpf-uubh
30
vulnerability VCID-yw62-qbkq-9ygq
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.1.4
1
url pkg:gem/rack@1.2.6
purl pkg:gem/rack@1.2.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35e6-cpn8-w7h1
1
vulnerability VCID-3ycr-9smk-uqdc
2
vulnerability VCID-47ja-djzb-2bbw
3
vulnerability VCID-7p12-ejdu-uqgy
4
vulnerability VCID-7wvj-9h3p-23am
5
vulnerability VCID-7zgg-tvu3-r7gt
6
vulnerability VCID-8zkw-y3yd-yuft
7
vulnerability VCID-91xe-ev7t-akb9
8
vulnerability VCID-9rpp-9xss-duf6
9
vulnerability VCID-9uh8-upzm-7bgd
10
vulnerability VCID-arac-j5h5-zkcu
11
vulnerability VCID-azu5-jcmd-3ufx
12
vulnerability VCID-c21j-snf1-d3cb
13
vulnerability VCID-c5sc-7qnn-mkb9
14
vulnerability VCID-d58r-22kr-9bct
15
vulnerability VCID-fpg2-nhey-rkcc
16
vulnerability VCID-gdhf-e8q1-kbat
17
vulnerability VCID-gtzk-m9rm-57hw
18
vulnerability VCID-jxws-ws21-4uaa
19
vulnerability VCID-npag-sz7d-v7b6
20
vulnerability VCID-qt1u-2p37-xfet
21
vulnerability VCID-s971-gkdg-jkhc
22
vulnerability VCID-skxv-7he3-xqgc
23
vulnerability VCID-udc4-7jnt-y3fu
24
vulnerability VCID-vkrw-y1j6-6fe7
25
vulnerability VCID-w732-52bx-2qf8
26
vulnerability VCID-wt7k-s1yd-nke6
27
vulnerability VCID-xazq-qrm1-9ff6
28
vulnerability VCID-xkah-9nv9-wufd
29
vulnerability VCID-xnz5-gv2x-17bk
30
vulnerability VCID-y12d-fjpf-uubh
31
vulnerability VCID-yw62-qbkq-9ygq
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.2.6
2
url pkg:gem/rack@1.3.0.beta
purl pkg:gem/rack@1.3.0.beta
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35e6-cpn8-w7h1
1
vulnerability VCID-3ycr-9smk-uqdc
2
vulnerability VCID-47ja-djzb-2bbw
3
vulnerability VCID-7p12-ejdu-uqgy
4
vulnerability VCID-7wvj-9h3p-23am
5
vulnerability VCID-7zgg-tvu3-r7gt
6
vulnerability VCID-8zkw-y3yd-yuft
7
vulnerability VCID-91xe-ev7t-akb9
8
vulnerability VCID-9rpp-9xss-duf6
9
vulnerability VCID-9uh8-upzm-7bgd
10
vulnerability VCID-arac-j5h5-zkcu
11
vulnerability VCID-azu5-jcmd-3ufx
12
vulnerability VCID-c21j-snf1-d3cb
13
vulnerability VCID-c5sc-7qnn-mkb9
14
vulnerability VCID-d58r-22kr-9bct
15
vulnerability VCID-fpg2-nhey-rkcc
16
vulnerability VCID-gdhf-e8q1-kbat
17
vulnerability VCID-ge4d-a8z8-m3c6
18
vulnerability VCID-gtzk-m9rm-57hw
19
vulnerability VCID-jxws-ws21-4uaa
20
vulnerability VCID-npag-sz7d-v7b6
21
vulnerability VCID-qt1u-2p37-xfet
22
vulnerability VCID-s971-gkdg-jkhc
23
vulnerability VCID-skxv-7he3-xqgc
24
vulnerability VCID-teq8-nqhf-xbbq
25
vulnerability VCID-udc4-7jnt-y3fu
26
vulnerability VCID-vkrw-y1j6-6fe7
27
vulnerability VCID-w732-52bx-2qf8
28
vulnerability VCID-wt7k-s1yd-nke6
29
vulnerability VCID-xazq-qrm1-9ff6
30
vulnerability VCID-xkah-9nv9-wufd
31
vulnerability VCID-xnz5-gv2x-17bk
32
vulnerability VCID-y12d-fjpf-uubh
33
vulnerability VCID-yw62-qbkq-9ygq
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.3.0.beta
3
url pkg:gem/rack@1.3.7
purl pkg:gem/rack@1.3.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35e6-cpn8-w7h1
1
vulnerability VCID-3ycr-9smk-uqdc
2
vulnerability VCID-47ja-djzb-2bbw
3
vulnerability VCID-7p12-ejdu-uqgy
4
vulnerability VCID-7wvj-9h3p-23am
5
vulnerability VCID-7zgg-tvu3-r7gt
6
vulnerability VCID-8zkw-y3yd-yuft
7
vulnerability VCID-91xe-ev7t-akb9
8
vulnerability VCID-9rpp-9xss-duf6
9
vulnerability VCID-9uh8-upzm-7bgd
10
vulnerability VCID-arac-j5h5-zkcu
11
vulnerability VCID-azu5-jcmd-3ufx
12
vulnerability VCID-c21j-snf1-d3cb
13
vulnerability VCID-c5sc-7qnn-mkb9
14
vulnerability VCID-d58r-22kr-9bct
15
vulnerability VCID-fpg2-nhey-rkcc
16
vulnerability VCID-gdhf-e8q1-kbat
17
vulnerability VCID-gtzk-m9rm-57hw
18
vulnerability VCID-jxws-ws21-4uaa
19
vulnerability VCID-npag-sz7d-v7b6
20
vulnerability VCID-qt1u-2p37-xfet
21
vulnerability VCID-s971-gkdg-jkhc
22
vulnerability VCID-skxv-7he3-xqgc
23
vulnerability VCID-teq8-nqhf-xbbq
24
vulnerability VCID-udc4-7jnt-y3fu
25
vulnerability VCID-vkrw-y1j6-6fe7
26
vulnerability VCID-w732-52bx-2qf8
27
vulnerability VCID-wt7k-s1yd-nke6
28
vulnerability VCID-xazq-qrm1-9ff6
29
vulnerability VCID-xkah-9nv9-wufd
30
vulnerability VCID-xnz5-gv2x-17bk
31
vulnerability VCID-y12d-fjpf-uubh
32
vulnerability VCID-yw62-qbkq-9ygq
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.3.7
4
url pkg:gem/rack@1.4.2
purl pkg:gem/rack@1.4.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35e6-cpn8-w7h1
1
vulnerability VCID-3ycr-9smk-uqdc
2
vulnerability VCID-47ja-djzb-2bbw
3
vulnerability VCID-7p12-ejdu-uqgy
4
vulnerability VCID-7wvj-9h3p-23am
5
vulnerability VCID-7zgg-tvu3-r7gt
6
vulnerability VCID-8zkw-y3yd-yuft
7
vulnerability VCID-9rpp-9xss-duf6
8
vulnerability VCID-9uh8-upzm-7bgd
9
vulnerability VCID-arac-j5h5-zkcu
10
vulnerability VCID-azu5-jcmd-3ufx
11
vulnerability VCID-c21j-snf1-d3cb
12
vulnerability VCID-c5sc-7qnn-mkb9
13
vulnerability VCID-d58r-22kr-9bct
14
vulnerability VCID-fpg2-nhey-rkcc
15
vulnerability VCID-gdhf-e8q1-kbat
16
vulnerability VCID-gtzk-m9rm-57hw
17
vulnerability VCID-jxws-ws21-4uaa
18
vulnerability VCID-npag-sz7d-v7b6
19
vulnerability VCID-qt1u-2p37-xfet
20
vulnerability VCID-s971-gkdg-jkhc
21
vulnerability VCID-skxv-7he3-xqgc
22
vulnerability VCID-teq8-nqhf-xbbq
23
vulnerability VCID-udc4-7jnt-y3fu
24
vulnerability VCID-vkrw-y1j6-6fe7
25
vulnerability VCID-w732-52bx-2qf8
26
vulnerability VCID-wt7k-s1yd-nke6
27
vulnerability VCID-xazq-qrm1-9ff6
28
vulnerability VCID-xkah-9nv9-wufd
29
vulnerability VCID-xnz5-gv2x-17bk
30
vulnerability VCID-y12d-fjpf-uubh
31
vulnerability VCID-yw62-qbkq-9ygq
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.4.2
aliases CVE-2012-6109, GHSA-h77x-m5q8-c29h, OSV-89317
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-91xe-ev7t-akb9
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/rack@0.4