Lookup for vulnerable packages by Package URL.

Purlpkg:gem/rack@3.0.0.0
Typegem
Namespace
Namerack
Version3.0.0.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.1.20
Latest_non_vulnerable_version3.2.6
Affected_by_vulnerabilities
0
url VCID-6c1k-vgv4-93ad
vulnerability_id VCID-6c1k-vgv4-93ad
summary
Duplicate
This advisory duplicates another.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44570.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44570.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-44570
reference_id
reference_type
scores
0
value 0.03289
scoring_system epss
scoring_elements 0.87172
published_at 2026-04-04T12:55:00Z
1
value 0.03289
scoring_system epss
scoring_elements 0.87155
published_at 2026-04-02T12:55:00Z
2
value 0.03355
scoring_system epss
scoring_elements 0.8735
published_at 2026-04-18T12:55:00Z
3
value 0.03355
scoring_system epss
scoring_elements 0.87342
published_at 2026-04-11T12:55:00Z
4
value 0.03355
scoring_system epss
scoring_elements 0.87336
published_at 2026-04-12T12:55:00Z
5
value 0.03355
scoring_system epss
scoring_elements 0.87332
published_at 2026-04-13T12:55:00Z
6
value 0.03355
scoring_system epss
scoring_elements 0.87347
published_at 2026-04-16T12:55:00Z
7
value 0.03631
scoring_system epss
scoring_elements 0.87801
published_at 2026-04-07T12:55:00Z
8
value 0.03631
scoring_system epss
scoring_elements 0.87829
published_at 2026-04-09T12:55:00Z
9
value 0.03631
scoring_system epss
scoring_elements 0.87822
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-44570
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30122
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30123
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44570
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44571
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44572
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27530
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27539
9
reference_url https://discuss.rubyonrails.org/t/cve-2022-44570-possible-denial-of-service-vulnerability-in-racks-range-header-parsing/82125
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://discuss.rubyonrails.org/t/cve-2022-44570-possible-denial-of-service-vulnerability-in-racks-range-header-parsing/82125
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://github.com/rack/rack
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack
12
reference_url https://github.com/rack/rack/releases/tag/v3.0.4.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/releases/tag/v3.0.4.1
13
reference_url https://security.netapp.com/advisory/ntap-20231208-0010
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20231208-0010
14
reference_url https://www.debian.org/security/2023/dsa-5530
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2023/dsa-5530
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029832
reference_id 1029832
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029832
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2164719
reference_id 2164719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2164719
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-44570
reference_id CVE-2022-44570
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-44570
18
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44570.yml
reference_id CVE-2022-44570.YML
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44570.yml
19
reference_url https://github.com/advisories/GHSA-65f5-mfpf-vfhj
reference_id GHSA-65f5-mfpf-vfhj
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-65f5-mfpf-vfhj
20
reference_url https://access.redhat.com/errata/RHSA-2023:6818
reference_id RHSA-2023:6818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6818
21
reference_url https://usn.ubuntu.com/5910-1/
reference_id USN-5910-1
reference_type
scores
url https://usn.ubuntu.com/5910-1/
22
reference_url https://usn.ubuntu.com/7036-1/
reference_id USN-7036-1
reference_type
scores
url https://usn.ubuntu.com/7036-1/
fixed_packages
0
url pkg:gem/rack@3.0.4.1
purl pkg:gem/rack@3.0.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-47ja-djzb-2bbw
1
vulnerability VCID-7p12-ejdu-uqgy
2
vulnerability VCID-7wvj-9h3p-23am
3
vulnerability VCID-7zgg-tvu3-r7gt
4
vulnerability VCID-9rpp-9xss-duf6
5
vulnerability VCID-arac-j5h5-zkcu
6
vulnerability VCID-azu5-jcmd-3ufx
7
vulnerability VCID-c5sc-7qnn-mkb9
8
vulnerability VCID-d58r-22kr-9bct
9
vulnerability VCID-fpg2-nhey-rkcc
10
vulnerability VCID-gtzk-m9rm-57hw
11
vulnerability VCID-npag-sz7d-v7b6
12
vulnerability VCID-s971-gkdg-jkhc
13
vulnerability VCID-skxv-7he3-xqgc
14
vulnerability VCID-w732-52bx-2qf8
15
vulnerability VCID-wt7k-s1yd-nke6
16
vulnerability VCID-xkah-9nv9-wufd
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.4.1
aliases CVE-2022-44570, GHSA-65f5-mfpf-vfhj, GMS-2023-64
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6c1k-vgv4-93ad
1
url VCID-c21j-snf1-d3cb
vulnerability_id VCID-c21j-snf1-d3cb
summary
Duplicate
This advisory duplicates another.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44572.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44572.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-44572
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.4954
published_at 2026-04-04T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49513
published_at 2026-04-02T12:55:00Z
2
value 0.00275
scoring_system epss
scoring_elements 0.50991
published_at 2026-04-18T12:55:00Z
3
value 0.00275
scoring_system epss
scoring_elements 0.50986
published_at 2026-04-11T12:55:00Z
4
value 0.00275
scoring_system epss
scoring_elements 0.50964
published_at 2026-04-12T12:55:00Z
5
value 0.00275
scoring_system epss
scoring_elements 0.50948
published_at 2026-04-13T12:55:00Z
6
value 0.00275
scoring_system epss
scoring_elements 0.50985
published_at 2026-04-16T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.53138
published_at 2026-04-07T12:55:00Z
8
value 0.00298
scoring_system epss
scoring_elements 0.53184
published_at 2026-04-09T12:55:00Z
9
value 0.00298
scoring_system epss
scoring_elements 0.53192
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-44572
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30122
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30123
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44570
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44571
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44572
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27530
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27539
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/rack/rack
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack
11
reference_url https://github.com/rack/rack/releases/tag/v3.0.4.1
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/releases/tag/v3.0.4.1
12
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44572.yml
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44572.yml
13
reference_url https://hackerone.com/reports/1639882
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1639882
14
reference_url https://www.debian.org/security/2023/dsa-5530
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2023/dsa-5530
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029832
reference_id 1029832
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029832
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2164722
reference_id 2164722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2164722
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-44572
reference_id CVE-2022-44572
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-44572
18
reference_url https://github.com/advisories/GHSA-rqv2-275x-2jq5
reference_id GHSA-rqv2-275x-2jq5
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rqv2-275x-2jq5
19
reference_url https://access.redhat.com/errata/RHSA-2023:6818
reference_id RHSA-2023:6818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6818
20
reference_url https://usn.ubuntu.com/5910-1/
reference_id USN-5910-1
reference_type
scores
url https://usn.ubuntu.com/5910-1/
21
reference_url https://usn.ubuntu.com/7036-1/
reference_id USN-7036-1
reference_type
scores
url https://usn.ubuntu.com/7036-1/
fixed_packages
0
url pkg:gem/rack@3.0.4.1
purl pkg:gem/rack@3.0.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-47ja-djzb-2bbw
1
vulnerability VCID-7p12-ejdu-uqgy
2
vulnerability VCID-7wvj-9h3p-23am
3
vulnerability VCID-7zgg-tvu3-r7gt
4
vulnerability VCID-9rpp-9xss-duf6
5
vulnerability VCID-arac-j5h5-zkcu
6
vulnerability VCID-azu5-jcmd-3ufx
7
vulnerability VCID-c5sc-7qnn-mkb9
8
vulnerability VCID-d58r-22kr-9bct
9
vulnerability VCID-fpg2-nhey-rkcc
10
vulnerability VCID-gtzk-m9rm-57hw
11
vulnerability VCID-npag-sz7d-v7b6
12
vulnerability VCID-s971-gkdg-jkhc
13
vulnerability VCID-skxv-7he3-xqgc
14
vulnerability VCID-w732-52bx-2qf8
15
vulnerability VCID-wt7k-s1yd-nke6
16
vulnerability VCID-xkah-9nv9-wufd
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.4.1
aliases CVE-2022-44572, GHSA-rqv2-275x-2jq5, GMS-2023-66
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c21j-snf1-d3cb
2
url VCID-vkrw-y1j6-6fe7
vulnerability_id VCID-vkrw-y1j6-6fe7
summary
Duplicate
This advisory duplicates another.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44571.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44571.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-44571
reference_id
reference_type
scores
0
value 0.03289
scoring_system epss
scoring_elements 0.87172
published_at 2026-04-04T12:55:00Z
1
value 0.03289
scoring_system epss
scoring_elements 0.87155
published_at 2026-04-02T12:55:00Z
2
value 0.03631
scoring_system epss
scoring_elements 0.87846
published_at 2026-04-18T12:55:00Z
3
value 0.03631
scoring_system epss
scoring_elements 0.87801
published_at 2026-04-07T12:55:00Z
4
value 0.03631
scoring_system epss
scoring_elements 0.87822
published_at 2026-04-08T12:55:00Z
5
value 0.03631
scoring_system epss
scoring_elements 0.87829
published_at 2026-04-09T12:55:00Z
6
value 0.03631
scoring_system epss
scoring_elements 0.87841
published_at 2026-04-11T12:55:00Z
7
value 0.03631
scoring_system epss
scoring_elements 0.87835
published_at 2026-04-12T12:55:00Z
8
value 0.03631
scoring_system epss
scoring_elements 0.87833
published_at 2026-04-13T12:55:00Z
9
value 0.03631
scoring_system epss
scoring_elements 0.87847
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-44571
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30122
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30123
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44570
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44571
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44572
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27530
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27539
9
reference_url https://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://github.com/rack/rack
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack
12
reference_url https://github.com/rack/rack/releases/tag/v3.0.4.1
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/releases/tag/v3.0.4.1
13
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44571.yml
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44571.yml
14
reference_url https://www.debian.org/security/2023/dsa-5530
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2023/dsa-5530
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029832
reference_id 1029832
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029832
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2164714
reference_id 2164714
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2164714
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-44571
reference_id CVE-2022-44571
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-44571
18
reference_url https://github.com/advisories/GHSA-93pm-5p5f-3ghx
reference_id GHSA-93pm-5p5f-3ghx
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-93pm-5p5f-3ghx
19
reference_url https://access.redhat.com/errata/RHSA-2023:6818
reference_id RHSA-2023:6818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6818
20
reference_url https://usn.ubuntu.com/5910-1/
reference_id USN-5910-1
reference_type
scores
url https://usn.ubuntu.com/5910-1/
21
reference_url https://usn.ubuntu.com/7036-1/
reference_id USN-7036-1
reference_type
scores
url https://usn.ubuntu.com/7036-1/
fixed_packages
0
url pkg:gem/rack@3.0.4.1
purl pkg:gem/rack@3.0.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-47ja-djzb-2bbw
1
vulnerability VCID-7p12-ejdu-uqgy
2
vulnerability VCID-7wvj-9h3p-23am
3
vulnerability VCID-7zgg-tvu3-r7gt
4
vulnerability VCID-9rpp-9xss-duf6
5
vulnerability VCID-arac-j5h5-zkcu
6
vulnerability VCID-azu5-jcmd-3ufx
7
vulnerability VCID-c5sc-7qnn-mkb9
8
vulnerability VCID-d58r-22kr-9bct
9
vulnerability VCID-fpg2-nhey-rkcc
10
vulnerability VCID-gtzk-m9rm-57hw
11
vulnerability VCID-npag-sz7d-v7b6
12
vulnerability VCID-s971-gkdg-jkhc
13
vulnerability VCID-skxv-7he3-xqgc
14
vulnerability VCID-w732-52bx-2qf8
15
vulnerability VCID-wt7k-s1yd-nke6
16
vulnerability VCID-xkah-9nv9-wufd
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.4.1
aliases CVE-2022-44571, GHSA-93pm-5p5f-3ghx, GMS-2023-65
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vkrw-y1j6-6fe7
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.0.0