Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/20213?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/20213?format=api", "purl": "pkg:gem/rack@0.4", "type": "gem", "namespace": "", "name": "rack", "version": "0.4", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.2.22", "latest_non_vulnerable_version": "3.2.6", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15425?format=api", "vulnerability_id": "VCID-7zgg-tvu3-r7gt", "summary": "Rack vulnerable to ReDoS in content type parsing (2nd degree polynomial)\n### Summary\n\n```ruby\nmodule Rack\n class MediaType\n SPLIT_PATTERN = %r{\\s*[;,]\\s*}\n```\nThe above regexp is subject to ReDos. 50K blank characters as a prefix to the header will take over 10s to split.\n\n### PoC\n\nA simple HTTP request with lots of blank characters in the content-type header:\n\n```ruby\nrequest[\"Content-Type\"] = (\" \" * 50_000) + \"a,\"\n```\n\n### Impact\n\nIt's a very easy to craft ReDoS. Like all ReDoS the impact is debatable.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-25126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58911", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58933", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58915", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58929", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63621", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64253", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-25126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146" }, { "reference_url": "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/rack/rack", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rack/rack" }, { "reference_url": "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462" }, { "reference_url": "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49" }, { "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx" }, { "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25126", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25126" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0005", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240510-0005" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516", "reference_id": "1064516", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265593", "reference_id": "2265593", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265593" }, { "reference_url": "https://github.com/advisories/GHSA-22f2-v57c-j9cx", "reference_id": "GHSA-22f2-v57c-j9cx", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-22f2-v57c-j9cx" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0005/", "reference_id": "ntap-20240510-0005", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240510-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10806", "reference_id": "RHSA-2024:10806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1841", "reference_id": "RHSA-2024:1841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1846", "reference_id": "RHSA-2024:1846", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1846" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2007", "reference_id": "RHSA-2024:2007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2113", "reference_id": "RHSA-2024:2113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2581", "reference_id": "RHSA-2024:2581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2584", "reference_id": "RHSA-2024:2584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2953", "reference_id": "RHSA-2024:2953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3431", "reference_id": "RHSA-2024:3431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3431" }, { "reference_url": "https://usn.ubuntu.com/6837-1/", "reference_id": "USN-6837-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6837-1/" }, { "reference_url": "https://usn.ubuntu.com/6837-2/", "reference_id": "USN-6837-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6837-2/" }, { "reference_url": "https://usn.ubuntu.com/7036-1/", "reference_id": "USN-7036-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7036-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/53267?format=api", "purl": "pkg:gem/rack@2.2.8.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-47ja-djzb-2bbw" }, { "vulnerability": "VCID-7p12-ejdu-uqgy" }, { "vulnerability": "VCID-7wvj-9h3p-23am" }, { "vulnerability": "VCID-9rpp-9xss-duf6" }, { "vulnerability": "VCID-azu5-jcmd-3ufx" }, { "vulnerability": "VCID-c5sc-7qnn-mkb9" }, { "vulnerability": "VCID-d58r-22kr-9bct" }, { "vulnerability": "VCID-gdhf-e8q1-kbat" }, { "vulnerability": "VCID-npag-sz7d-v7b6" }, { "vulnerability": "VCID-s971-gkdg-jkhc" }, { "vulnerability": "VCID-skxv-7he3-xqgc" }, { "vulnerability": "VCID-w732-52bx-2qf8" }, { "vulnerability": "VCID-wt7k-s1yd-nke6" }, { "vulnerability": "VCID-xazq-qrm1-9ff6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@2.2.8.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/53258?format=api", "purl": "pkg:gem/rack@3.0.9.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-47ja-djzb-2bbw" }, { "vulnerability": "VCID-7p12-ejdu-uqgy" }, { "vulnerability": "VCID-7wvj-9h3p-23am" }, { "vulnerability": "VCID-9rpp-9xss-duf6" }, { "vulnerability": "VCID-azu5-jcmd-3ufx" }, { "vulnerability": "VCID-c5sc-7qnn-mkb9" }, { "vulnerability": "VCID-d58r-22kr-9bct" }, { "vulnerability": "VCID-npag-sz7d-v7b6" }, { "vulnerability": "VCID-s971-gkdg-jkhc" }, { "vulnerability": "VCID-skxv-7he3-xqgc" }, { "vulnerability": "VCID-w732-52bx-2qf8" }, { "vulnerability": "VCID-wt7k-s1yd-nke6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.9.1" } ], "aliases": [ "CVE-2024-25126", "GHSA-22f2-v57c-j9cx" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7zgg-tvu3-r7gt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6786?format=api", "vulnerability_id": "VCID-91xe-ev7t-akb9", "summary": "Uncontrolled Resource Consumption\nlib/rack/multipart.rb in Rack uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.", "references": [ { "reference_url": "http://rack.github.com/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rack.github.com/" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0544", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2013:0544" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6109.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6109.json" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2012-6109", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/security/cve/CVE-2012-6109" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6109", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74542", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.7445", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74454", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.7448", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74455", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74487", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74503", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74524", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74506", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74497", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00828", "scoring_system": "epss", "scoring_elements": "0.74535", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6109" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6109", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6109" }, { "reference_url": "https://github.com/rack/rack", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rack/rack" }, { "reference_url": "https://github.com/rack/rack/blob/master/README.rdoc", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rack/rack/blob/master/README.rdoc" }, { "reference_url": "https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5" }, { "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2012-6109.yml", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2012-6109.yml" }, { "reference_url": "https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ" }, { "reference_url": "https://groups.google.com/forum/#!msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/forum/#!msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2013-0544.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698440", "reference_id": "698440", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698440" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6109", "reference_id": "CVE-2012-6109", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6109" }, { "reference_url": "https://github.com/advisories/GHSA-h77x-m5q8-c29h", "reference_id": "GHSA-h77x-m5q8-c29h", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-h77x-m5q8-c29h" }, { "reference_url": "https://security.gentoo.org/glsa/201405-10", "reference_id": "GLSA-201405-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-10" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/68285?format=api", "purl": "pkg:gem/rack@1.1.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35e6-cpn8-w7h1" }, { "vulnerability": "VCID-3ycr-9smk-uqdc" }, { "vulnerability": "VCID-47ja-djzb-2bbw" }, { "vulnerability": "VCID-7p12-ejdu-uqgy" }, { "vulnerability": "VCID-7wvj-9h3p-23am" }, { "vulnerability": "VCID-7zgg-tvu3-r7gt" }, { "vulnerability": "VCID-8zkw-y3yd-yuft" }, { "vulnerability": "VCID-91xe-ev7t-akb9" }, { "vulnerability": "VCID-9rpp-9xss-duf6" }, { "vulnerability": "VCID-9uh8-upzm-7bgd" }, { "vulnerability": "VCID-arac-j5h5-zkcu" }, { "vulnerability": "VCID-azu5-jcmd-3ufx" }, { "vulnerability": "VCID-c21j-snf1-d3cb" }, { "vulnerability": "VCID-c5sc-7qnn-mkb9" }, { "vulnerability": "VCID-d58r-22kr-9bct" }, { "vulnerability": "VCID-fpg2-nhey-rkcc" }, { "vulnerability": "VCID-gdhf-e8q1-kbat" }, { "vulnerability": "VCID-gtzk-m9rm-57hw" }, { "vulnerability": "VCID-jxws-ws21-4uaa" }, { "vulnerability": "VCID-npag-sz7d-v7b6" }, { "vulnerability": "VCID-s971-gkdg-jkhc" }, { "vulnerability": "VCID-skxv-7he3-xqgc" }, { "vulnerability": "VCID-udc4-7jnt-y3fu" }, { "vulnerability": "VCID-vkrw-y1j6-6fe7" }, { "vulnerability": "VCID-w732-52bx-2qf8" }, { "vulnerability": "VCID-wt7k-s1yd-nke6" }, { "vulnerability": "VCID-xazq-qrm1-9ff6" }, { "vulnerability": "VCID-xkah-9nv9-wufd" }, { "vulnerability": "VCID-xnz5-gv2x-17bk" }, { "vulnerability": "VCID-y12d-fjpf-uubh" }, { "vulnerability": "VCID-yw62-qbkq-9ygq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/68286?format=api", "purl": "pkg:gem/rack@1.2.6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35e6-cpn8-w7h1" }, { "vulnerability": "VCID-3ycr-9smk-uqdc" }, { "vulnerability": "VCID-47ja-djzb-2bbw" }, { "vulnerability": "VCID-7p12-ejdu-uqgy" }, { "vulnerability": "VCID-7wvj-9h3p-23am" }, { "vulnerability": "VCID-7zgg-tvu3-r7gt" }, { "vulnerability": "VCID-8zkw-y3yd-yuft" }, { "vulnerability": "VCID-91xe-ev7t-akb9" }, { "vulnerability": "VCID-9rpp-9xss-duf6" }, { "vulnerability": "VCID-9uh8-upzm-7bgd" }, { "vulnerability": "VCID-arac-j5h5-zkcu" }, { "vulnerability": "VCID-azu5-jcmd-3ufx" }, { "vulnerability": "VCID-c21j-snf1-d3cb" }, { "vulnerability": "VCID-c5sc-7qnn-mkb9" }, { "vulnerability": "VCID-d58r-22kr-9bct" }, { "vulnerability": "VCID-fpg2-nhey-rkcc" }, { "vulnerability": "VCID-gdhf-e8q1-kbat" }, { "vulnerability": "VCID-gtzk-m9rm-57hw" }, { "vulnerability": "VCID-jxws-ws21-4uaa" }, { "vulnerability": "VCID-npag-sz7d-v7b6" }, { "vulnerability": "VCID-qt1u-2p37-xfet" }, { "vulnerability": "VCID-s971-gkdg-jkhc" }, { "vulnerability": "VCID-skxv-7he3-xqgc" }, { "vulnerability": "VCID-udc4-7jnt-y3fu" }, { "vulnerability": "VCID-vkrw-y1j6-6fe7" }, { "vulnerability": "VCID-w732-52bx-2qf8" }, { "vulnerability": "VCID-wt7k-s1yd-nke6" }, { "vulnerability": "VCID-xazq-qrm1-9ff6" }, { "vulnerability": "VCID-xkah-9nv9-wufd" }, { "vulnerability": "VCID-xnz5-gv2x-17bk" }, { "vulnerability": "VCID-y12d-fjpf-uubh" }, { "vulnerability": "VCID-yw62-qbkq-9ygq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.2.6" }, { "url": "http://public2.vulnerablecode.io/api/packages/20026?format=api", "purl": "pkg:gem/rack@1.3.0.beta", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35e6-cpn8-w7h1" }, { "vulnerability": "VCID-3ycr-9smk-uqdc" }, { "vulnerability": "VCID-47ja-djzb-2bbw" }, { "vulnerability": "VCID-7p12-ejdu-uqgy" }, { "vulnerability": "VCID-7wvj-9h3p-23am" }, { "vulnerability": "VCID-7zgg-tvu3-r7gt" }, { "vulnerability": "VCID-8zkw-y3yd-yuft" }, { "vulnerability": "VCID-91xe-ev7t-akb9" }, { "vulnerability": "VCID-9rpp-9xss-duf6" }, { "vulnerability": "VCID-9uh8-upzm-7bgd" }, { "vulnerability": "VCID-arac-j5h5-zkcu" }, { "vulnerability": "VCID-azu5-jcmd-3ufx" }, { "vulnerability": "VCID-c21j-snf1-d3cb" }, { "vulnerability": "VCID-c5sc-7qnn-mkb9" }, { "vulnerability": "VCID-d58r-22kr-9bct" }, { "vulnerability": "VCID-fpg2-nhey-rkcc" }, { "vulnerability": "VCID-gdhf-e8q1-kbat" }, { "vulnerability": "VCID-ge4d-a8z8-m3c6" }, { "vulnerability": "VCID-gtzk-m9rm-57hw" }, { "vulnerability": "VCID-jxws-ws21-4uaa" }, { "vulnerability": "VCID-npag-sz7d-v7b6" }, { "vulnerability": "VCID-qt1u-2p37-xfet" }, { "vulnerability": "VCID-s971-gkdg-jkhc" }, { "vulnerability": "VCID-skxv-7he3-xqgc" }, { "vulnerability": "VCID-teq8-nqhf-xbbq" }, { "vulnerability": "VCID-udc4-7jnt-y3fu" }, { "vulnerability": "VCID-vkrw-y1j6-6fe7" }, { "vulnerability": "VCID-w732-52bx-2qf8" }, { "vulnerability": "VCID-wt7k-s1yd-nke6" }, { "vulnerability": "VCID-xazq-qrm1-9ff6" }, { "vulnerability": "VCID-xkah-9nv9-wufd" }, { "vulnerability": "VCID-xnz5-gv2x-17bk" }, { "vulnerability": "VCID-y12d-fjpf-uubh" }, { "vulnerability": "VCID-yw62-qbkq-9ygq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.3.0.beta" }, { "url": "http://public2.vulnerablecode.io/api/packages/68287?format=api", "purl": "pkg:gem/rack@1.3.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35e6-cpn8-w7h1" }, { "vulnerability": "VCID-3ycr-9smk-uqdc" }, { "vulnerability": "VCID-47ja-djzb-2bbw" }, { "vulnerability": "VCID-7p12-ejdu-uqgy" }, { "vulnerability": "VCID-7wvj-9h3p-23am" }, { "vulnerability": "VCID-7zgg-tvu3-r7gt" }, { "vulnerability": "VCID-8zkw-y3yd-yuft" }, { "vulnerability": "VCID-91xe-ev7t-akb9" }, { "vulnerability": "VCID-9rpp-9xss-duf6" }, { "vulnerability": "VCID-9uh8-upzm-7bgd" }, { "vulnerability": "VCID-arac-j5h5-zkcu" }, { "vulnerability": "VCID-azu5-jcmd-3ufx" }, { "vulnerability": "VCID-c21j-snf1-d3cb" }, { "vulnerability": "VCID-c5sc-7qnn-mkb9" }, { "vulnerability": "VCID-d58r-22kr-9bct" }, { "vulnerability": "VCID-fpg2-nhey-rkcc" }, { "vulnerability": "VCID-gdhf-e8q1-kbat" }, { "vulnerability": "VCID-gtzk-m9rm-57hw" }, { "vulnerability": "VCID-jxws-ws21-4uaa" }, { "vulnerability": "VCID-npag-sz7d-v7b6" }, { "vulnerability": "VCID-qt1u-2p37-xfet" }, { "vulnerability": "VCID-s971-gkdg-jkhc" }, { "vulnerability": "VCID-skxv-7he3-xqgc" }, { "vulnerability": "VCID-teq8-nqhf-xbbq" }, { "vulnerability": "VCID-udc4-7jnt-y3fu" }, { "vulnerability": "VCID-vkrw-y1j6-6fe7" }, { "vulnerability": "VCID-w732-52bx-2qf8" }, { "vulnerability": "VCID-wt7k-s1yd-nke6" }, { "vulnerability": "VCID-xazq-qrm1-9ff6" }, { "vulnerability": "VCID-xkah-9nv9-wufd" }, { "vulnerability": "VCID-xnz5-gv2x-17bk" }, { "vulnerability": "VCID-y12d-fjpf-uubh" }, { "vulnerability": "VCID-yw62-qbkq-9ygq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.3.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/20215?format=api", "purl": "pkg:gem/rack@1.4.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-35e6-cpn8-w7h1" }, { "vulnerability": "VCID-3ycr-9smk-uqdc" }, { "vulnerability": "VCID-47ja-djzb-2bbw" }, { "vulnerability": "VCID-7p12-ejdu-uqgy" }, { "vulnerability": "VCID-7wvj-9h3p-23am" }, { "vulnerability": "VCID-7zgg-tvu3-r7gt" }, { "vulnerability": "VCID-8zkw-y3yd-yuft" }, { "vulnerability": "VCID-9rpp-9xss-duf6" }, { "vulnerability": "VCID-9uh8-upzm-7bgd" }, { "vulnerability": "VCID-arac-j5h5-zkcu" }, { "vulnerability": "VCID-azu5-jcmd-3ufx" }, { "vulnerability": "VCID-c21j-snf1-d3cb" }, { "vulnerability": "VCID-c5sc-7qnn-mkb9" }, { "vulnerability": "VCID-d58r-22kr-9bct" }, { "vulnerability": "VCID-fpg2-nhey-rkcc" }, { "vulnerability": "VCID-gdhf-e8q1-kbat" }, { "vulnerability": "VCID-gtzk-m9rm-57hw" }, { "vulnerability": "VCID-jxws-ws21-4uaa" }, { "vulnerability": "VCID-npag-sz7d-v7b6" }, { "vulnerability": "VCID-qt1u-2p37-xfet" }, { "vulnerability": "VCID-s971-gkdg-jkhc" }, { "vulnerability": "VCID-skxv-7he3-xqgc" }, { "vulnerability": "VCID-teq8-nqhf-xbbq" }, { "vulnerability": "VCID-udc4-7jnt-y3fu" }, { "vulnerability": "VCID-vkrw-y1j6-6fe7" }, { "vulnerability": "VCID-w732-52bx-2qf8" }, { "vulnerability": "VCID-wt7k-s1yd-nke6" }, { "vulnerability": "VCID-xazq-qrm1-9ff6" }, { "vulnerability": "VCID-xkah-9nv9-wufd" }, { "vulnerability": "VCID-xnz5-gv2x-17bk" }, { "vulnerability": "VCID-y12d-fjpf-uubh" }, { "vulnerability": "VCID-yw62-qbkq-9ygq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.4.2" } ], "aliases": [ "CVE-2012-6109", "GHSA-h77x-m5q8-c29h", "OSV-89317" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-91xe-ev7t-akb9" } ], "fixing_vulnerabilities": [], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@0.4" }