Lookup for vulnerable packages by Package URL.

GET /api/packages/69401?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/69401?format=api",
    "purl": "pkg:gem/rack@3.0.12",
    "type": "gem",
    "namespace": "",
    "name": "rack",
    "version": "3.0.12",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "3.1.20",
    "latest_non_vulnerable_version": "3.2.6",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30435?format=api",
            "vulnerability_id": "VCID-47ja-djzb-2bbw",
            "summary": "Rack has an Unbounded-Parameter DoS in Rack::QueryParser\n## Summary\n\n`Rack::QueryParser` parses query strings and `application/x-www-form-urlencoded` bodies into Ruby data structures without imposing any limit on the number of parameters, allowing attackers to send requests with extremely large numbers of parameters.\n\n## Details\n\nThe vulnerability arises because `Rack::QueryParser` iterates over each `&`-separated key-value pair and adds it to a Hash without enforcing an upper bound on the total number of parameters. This allows an attacker to send a single request containing hundreds of thousands (or more) of parameters, which consumes excessive memory and CPU during parsing.\n\n## Impact\n\nAn attacker can trigger denial of service by sending specifically crafted HTTP requests, which can cause memory exhaustion or pin CPU resources, stalling or crashing the Rack server. This results in full service disruption until the affected worker is restarted.\n\n## Mitigation\n\n- Update to a version of Rack that limits the number of parameters parsed, or\n- Use middleware to enforce a maximum query string size or parameter count, or\n- Employ a reverse proxy (such as Nginx) to limit request sizes and reject oversized query strings or bodies.\n\nLimiting request body sizes and query string lengths at the web server or CDN level is an effective mitigation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46727.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46727.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-46727",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74239",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74202",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74227",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74205",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7419",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74157",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74185",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74158",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-46727"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46727",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46727"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/2bb5263b464b65ba4b648996a579dbd180d2b712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T14:00:33Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/2bb5263b464b65ba4b648996a579dbd180d2b712"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/3f5a4249118d09d199fe480466c8c6717e43b6e3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T14:00:33Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/3f5a4249118d09d199fe480466c8c6717e43b6e3"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/cd6b70a1f2a1016b73dc906f924869f4902c2d74",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T14:00:33Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/cd6b70a1f2a1016b73dc906f924869f4902c2d74"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-gjh7-p2fx-99vx",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T14:00:33Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-gjh7-p2fx-99vx"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-46727.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-46727.yml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46727",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46727"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104927",
                    "reference_id": "1104927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104927"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2364966",
                    "reference_id": "2364966",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2364966"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-gjh7-p2fx-99vx",
                    "reference_id": "GHSA-gjh7-p2fx-99vx",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-gjh7-p2fx-99vx"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7604",
                    "reference_id": "RHSA-2025:7604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7604"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7605",
                    "reference_id": "RHSA-2025:7605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7605"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8254",
                    "reference_id": "RHSA-2025:8254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8256",
                    "reference_id": "RHSA-2025:8256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8256"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8279",
                    "reference_id": "RHSA-2025:8279",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8279"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8288",
                    "reference_id": "RHSA-2025:8288",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8288"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8289",
                    "reference_id": "RHSA-2025:8289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8290",
                    "reference_id": "RHSA-2025:8290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8290"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8291",
                    "reference_id": "RHSA-2025:8291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8291"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8319",
                    "reference_id": "RHSA-2025:8319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8319"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8322",
                    "reference_id": "RHSA-2025:8322",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8322"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8323",
                    "reference_id": "RHSA-2025:8323",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8323"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9838",
                    "reference_id": "RHSA-2025:9838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9838"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7507-1/",
                    "reference_id": "USN-7507-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7507-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71214?format=api",
                    "purl": "pkg:gem/rack@3.0.16",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.16"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/71215?format=api",
                    "purl": "pkg:gem/rack@3.1.14",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.14"
                }
            ],
            "aliases": [
                "CVE-2025-46727",
                "GHSA-gjh7-p2fx-99vx"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-47ja-djzb-2bbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/29240?format=api",
            "vulnerability_id": "VCID-7p12-ejdu-uqgy",
            "summary": "Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection\n## Summary\n\n`Rack::Sendfile` can be exploited by crafting input that includes newline characters to manipulate log entries.\n\n## Details\n\nThe `Rack::Sendfile` middleware logs unsanitized header values from the `X-Sendfile-Type` header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection.\n\n## Impact\n\nThis vulnerability can distort log files, obscure attack traces, and complicate security auditing.\n\n## Mitigation\n\n- Update to the latest version of Rack, or\n- Remove usage of `Rack::Sendfile`.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27111.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27111.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62431",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62429",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62462",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62516",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62496",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6248",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68747",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6959",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7132",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27111"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:44:28Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:44:28Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:44:28Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-04T15:44:28Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-27111.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-27111.yml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00016.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00016.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27111"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099546",
                    "reference_id": "1099546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099546"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349810",
                    "reference_id": "2349810",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349810"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8cgq-6mh2-7j6v",
                    "reference_id": "GHSA-8cgq-6mh2-7j6v",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8cgq-6mh2-7j6v"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7366-1/",
                    "reference_id": "USN-7366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7366-2/",
                    "reference_id": "USN-7366-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7366-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/70108?format=api",
                    "purl": "pkg:gem/rack@3.0.13",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-47ja-djzb-2bbw"
                        },
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        },
                        {
                            "vulnerability": "VCID-wt7k-s1yd-nke6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.13"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/70109?format=api",
                    "purl": "pkg:gem/rack@3.1.11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-47ja-djzb-2bbw"
                        },
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        },
                        {
                            "vulnerability": "VCID-wt7k-s1yd-nke6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.11"
                }
            ],
            "aliases": [
                "CVE-2025-27111",
                "GHSA-8cgq-6mh2-7j6v"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7p12-ejdu-uqgy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30111?format=api",
            "vulnerability_id": "VCID-7wvj-9h3p-23am",
            "summary": "ReDoS Vulnerability in Rack::Multipart handle_mime_head\n### Summary\nThere is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571.\n\n### Details\n\nCarefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.\n\n### Credits\n\nThanks to [scyoon](https://hackerone.com/scyoon) for reporting this to the Rails security team",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49007.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49007.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.686",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6851",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68528",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68558",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68576",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68602",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6859",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6856",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49007"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/4795831a0a310c2d31102749e551b38faab6401f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-05T13:20:37Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/4795831a0a310c2d31102749e551b38faab6401f"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/aed514df37e33907df3c971ed3ca9a0a20ac2901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-05T13:20:37Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/aed514df37e33907df3c971ed3ca9a0a20ac2901"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-05T13:20:37Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-49007.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-49007.yml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49007"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107363",
                    "reference_id": "1107363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107363"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370346",
                    "reference_id": "2370346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370346"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-47m2-26rw-j2jw",
                    "reference_id": "GHSA-47m2-26rw-j2jw",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-47m2-26rw-j2jw"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/70900?format=api",
                    "purl": "pkg:gem/rack@3.1.16",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.16"
                }
            ],
            "aliases": [
                "CVE-2025-49007",
                "GHSA-47m2-26rw-j2jw"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7wvj-9h3p-23am"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/21702?format=api",
            "vulnerability_id": "VCID-9rpp-9xss-duf6",
            "summary": "Rack has a Directory Traversal via Rack:Directory\n## Summary\n\n`Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the target path starts with the root string, allowing directory listing outside the intended root.\n\n## Details\n\nIn `directory.rb`, `File.expand_path(File.join(root, path_info)).start_with?(root)` does not enforce a path boundary. If the server root is `/var/www/root`, a path like `/var/www/root_backup` passes the check because it shares the same prefix, so `Rack::Directory` will list that directory also. \n\n## Impact\n\nInformation disclosure via directory listing outside the configured root when `Rack::Directory` is exposed to untrusted clients and a directory shares the root prefix (e.g., `public2`, `www_backup`).\n\n## Mitigation\n\n* Update to a patched version of Rack that correctly checks the root prefix.\n* Don't name directories with the same prefix as one which is exposed via `Rack::Directory`.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22860.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22860.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-22860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2772",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27712",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27769",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27811",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27762",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27695",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27903",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27862",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27805",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-22860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22860"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/75c5745c286637a8f049a33790c71237762069e7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-18T19:27:31Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/75c5745c286637a8f049a33790c71237762069e7"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-mxw3-3hh2-x2mh",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-18T19:27:31Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-mxw3-3hh2-x2mh"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2026-22860.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2026-22860.yml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22860"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128479",
                    "reference_id": "1128479",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128479"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440737",
                    "reference_id": "2440737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440737"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-mxw3-3hh2-x2mh",
                    "reference_id": "GHSA-mxw3-3hh2-x2mh",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-mxw3-3hh2-x2mh"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8066-1/",
                    "reference_id": "USN-8066-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8066-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64152?format=api",
                    "purl": "pkg:gem/rack@3.1.20",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.20"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64153?format=api",
                    "purl": "pkg:gem/rack@3.2.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.2.5"
                }
            ],
            "aliases": [
                "CVE-2026-22860",
                "GHSA-mxw3-3hh2-x2mh"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9rpp-9xss-duf6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/21707?format=api",
            "vulnerability_id": "VCID-azu5-jcmd-3ufx",
            "summary": "Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion)\n`Rack::Multipart::Parser` can accumulate unbounded data when a multipart part’s header block never terminates with the required blank line (`CRLFCRLF`). The parser keeps appending incoming bytes to memory without a size cap, allowing a remote attacker to exhaust memory and cause a denial of service (DoS).",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61772.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61772.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61772",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41281",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41238",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41251",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41283",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41261",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41278",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41249",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41253",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61772"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61772",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61772"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:19Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:19Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:19Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117627",
                    "reference_id": "1117627",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117627"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402200",
                    "reference_id": "2402200",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402200"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61772",
                    "reference_id": "CVE-2025-61772",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61772"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61772.yml",
                    "reference_id": "CVE-2025-61772.YML",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61772.yml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-wpv5-97wm-hp9c",
                    "reference_id": "GHSA-wpv5-97wm-hp9c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-wpv5-97wm-hp9c"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-wpv5-97wm-hp9c",
                    "reference_id": "GHSA-wpv5-97wm-hp9c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:19Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-wpv5-97wm-hp9c"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19512",
                    "reference_id": "RHSA-2025:19512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19512"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19513",
                    "reference_id": "RHSA-2025:19513",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19513"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19647",
                    "reference_id": "RHSA-2025:19647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19719",
                    "reference_id": "RHSA-2025:19719",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19719"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19733",
                    "reference_id": "RHSA-2025:19733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19733"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19734",
                    "reference_id": "RHSA-2025:19734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19736",
                    "reference_id": "RHSA-2025:19736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19800",
                    "reference_id": "RHSA-2025:19800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19948",
                    "reference_id": "RHSA-2025:19948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:20962",
                    "reference_id": "RHSA-2025:20962",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:20962"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21036",
                    "reference_id": "RHSA-2025:21036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21036"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7960-1/",
                    "reference_id": "USN-7960-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7960-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64135?format=api",
                    "purl": "pkg:gem/rack@3.1.17",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.17"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64137?format=api",
                    "purl": "pkg:gem/rack@3.2.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.2.2"
                }
            ],
            "aliases": [
                "CVE-2025-61772",
                "GHSA-wpv5-97wm-hp9c"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-azu5-jcmd-3ufx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/21690?format=api",
            "vulnerability_id": "VCID-c5sc-7qnn-mkb9",
            "summary": "Rack: Multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion)\n`Rack::Multipart::Parser` stores non-file form fields (parts without a `filename`) entirely in memory as Ruby `String` objects. A single large text field in a multipart/form-data request (hundreds of megabytes or more) can consume equivalent process memory, potentially leading to out-of-memory (OOM) conditions and denial of service (DoS).",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61771.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61771.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26999",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2699",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27047",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27091",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27087",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27042",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27182",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27146",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61771"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61771"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:58Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:58Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:58Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117628",
                    "reference_id": "1117628",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117628"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402175",
                    "reference_id": "2402175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402175"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61771",
                    "reference_id": "CVE-2025-61771",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61771"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61771.yml",
                    "reference_id": "CVE-2025-61771.YML",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61771.yml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-w9pc-fmgc-vxvw",
                    "reference_id": "GHSA-w9pc-fmgc-vxvw",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-w9pc-fmgc-vxvw"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw",
                    "reference_id": "GHSA-w9pc-fmgc-vxvw",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:58Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19512",
                    "reference_id": "RHSA-2025:19512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19512"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19513",
                    "reference_id": "RHSA-2025:19513",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19513"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19647",
                    "reference_id": "RHSA-2025:19647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19719",
                    "reference_id": "RHSA-2025:19719",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19719"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19734",
                    "reference_id": "RHSA-2025:19734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19800",
                    "reference_id": "RHSA-2025:19800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19948",
                    "reference_id": "RHSA-2025:19948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:20962",
                    "reference_id": "RHSA-2025:20962",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:20962"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21036",
                    "reference_id": "RHSA-2025:21036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21036"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21696",
                    "reference_id": "RHSA-2025:21696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7960-1/",
                    "reference_id": "USN-7960-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7960-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64135?format=api",
                    "purl": "pkg:gem/rack@3.1.17",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.17"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64137?format=api",
                    "purl": "pkg:gem/rack@3.2.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.2.2"
                }
            ],
            "aliases": [
                "CVE-2025-61771",
                "GHSA-w9pc-fmgc-vxvw"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c5sc-7qnn-mkb9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/21773?format=api",
            "vulnerability_id": "VCID-d58r-22kr-9bct",
            "summary": "Rack has a Possible Information Disclosure Vulnerability\nA possible information disclosure vulnerability existed in `Rack::Sendfile` when running behind a proxy that supports `x-sendfile` headers (such as Nginx). Specially crafted headers could cause `Rack::Sendfile` to miscommunicate with the proxy and trigger unintended internal requests, potentially bypassing proxy-level access restrictions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10267",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10396",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10418",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10462",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10434",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10294",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10394",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10328",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10368",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61780"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61780"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/57277b7741581fa827472c5c666f6e6a33abd784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-10T20:34:55Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/57277b7741581fa827472c5c666f6e6a33abd784"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/7e69f65eefe9cd2868df9f9f3b0977b86f93523a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-10T20:34:55Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/7e69f65eefe9cd2868df9f9f3b0977b86f93523a"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/fba2c8bc63eb787ff4b19bc612d315fda6126d85",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-10T20:34:55Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/fba2c8bc63eb787ff4b19bc612d315fda6126d85"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117855",
                    "reference_id": "1117855",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117855"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403126",
                    "reference_id": "2403126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403126"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61780",
                    "reference_id": "CVE-2025-61780",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61780"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61780.yml",
                    "reference_id": "CVE-2025-61780.YML",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61780.yml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r657-rxjc-j557",
                    "reference_id": "GHSA-r657-rxjc-j557",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r657-rxjc-j557"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-r657-rxjc-j557",
                    "reference_id": "GHSA-r657-rxjc-j557",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-10T20:34:55Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-r657-rxjc-j557"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7960-1/",
                    "reference_id": "USN-7960-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7960-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64226?format=api",
                    "purl": "pkg:gem/rack@3.1.18",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64227?format=api",
                    "purl": "pkg:gem/rack@3.2.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.2.3"
                }
            ],
            "aliases": [
                "CVE-2025-61780",
                "GHSA-r657-rxjc-j557"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d58r-22kr-9bct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/21709?format=api",
            "vulnerability_id": "VCID-npag-sz7d-v7b6",
            "summary": "Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion)\n`Rack::Multipart::Parser` buffers the entire multipart **preamble** (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61770.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61770.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3674",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36695",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36721",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36756",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36747",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3673",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3668",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36844",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36812",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61770"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61770"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T15:23:07Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T15:23:07Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T15:23:07Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117627",
                    "reference_id": "1117627",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117627"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402174",
                    "reference_id": "2402174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402174"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61770",
                    "reference_id": "CVE-2025-61770",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61770"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61770.yml",
                    "reference_id": "CVE-2025-61770.YML",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61770.yml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-p543-xpfm-54cp",
                    "reference_id": "GHSA-p543-xpfm-54cp",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-p543-xpfm-54cp"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-p543-xpfm-54cp",
                    "reference_id": "GHSA-p543-xpfm-54cp",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T15:23:07Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-p543-xpfm-54cp"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19512",
                    "reference_id": "RHSA-2025:19512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19512"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19513",
                    "reference_id": "RHSA-2025:19513",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19513"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19647",
                    "reference_id": "RHSA-2025:19647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19719",
                    "reference_id": "RHSA-2025:19719",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19719"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19733",
                    "reference_id": "RHSA-2025:19733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19733"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19734",
                    "reference_id": "RHSA-2025:19734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19736",
                    "reference_id": "RHSA-2025:19736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19800",
                    "reference_id": "RHSA-2025:19800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19948",
                    "reference_id": "RHSA-2025:19948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:20962",
                    "reference_id": "RHSA-2025:20962",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:20962"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21036",
                    "reference_id": "RHSA-2025:21036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21036"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21696",
                    "reference_id": "RHSA-2025:21696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7960-1/",
                    "reference_id": "USN-7960-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7960-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64135?format=api",
                    "purl": "pkg:gem/rack@3.1.17",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.17"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64137?format=api",
                    "purl": "pkg:gem/rack@3.2.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.2.2"
                }
            ],
            "aliases": [
                "CVE-2025-61770",
                "GHSA-p543-xpfm-54cp"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-npag-sz7d-v7b6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/21764?format=api",
            "vulnerability_id": "VCID-s971-gkdg-jkhc",
            "summary": "Rack is vulnerable to a memory-exhaustion DoS through unbounded URL-encoded body parsing\n`Rack::Request#POST` reads the entire request body into memory for `Content-Type: application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcing a length or cap. Large request bodies can therefore be buffered completely into process memory before parsing, leading to denial of service (DoS) through memory exhaustion.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61919.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61919.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61919",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44791",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44737",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44735",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44767",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4475",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44695",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44756",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44736",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44748",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-61919"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61919",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61919"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/4e2c903991a790ee211a3021808ff4fd6fe82881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-10T20:48:10Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/4e2c903991a790ee211a3021808ff4fd6fe82881"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/cbd541e8a3d0c5830a3c9a30d3718ce2e124f9db",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-10T20:48:10Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/cbd541e8a3d0c5830a3c9a30d3718ce2e124f9db"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/e179614c4a653283286f5f046428cbb85f21146f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-10T20:48:10Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/e179614c4a653283286f5f046428cbb85f21146f"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117856",
                    "reference_id": "1117856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117856"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403180",
                    "reference_id": "2403180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403180"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61919",
                    "reference_id": "CVE-2025-61919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61919"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61919.yml",
                    "reference_id": "CVE-2025-61919.YML",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61919.yml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-6xw4-3v39-52mm",
                    "reference_id": "GHSA-6xw4-3v39-52mm",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-6xw4-3v39-52mm"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-6xw4-3v39-52mm",
                    "reference_id": "GHSA-6xw4-3v39-52mm",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-10T20:48:10Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-6xw4-3v39-52mm"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19512",
                    "reference_id": "RHSA-2025:19512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19512"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19513",
                    "reference_id": "RHSA-2025:19513",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19513"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19647",
                    "reference_id": "RHSA-2025:19647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19719",
                    "reference_id": "RHSA-2025:19719",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19719"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19733",
                    "reference_id": "RHSA-2025:19733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19733"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19734",
                    "reference_id": "RHSA-2025:19734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19736",
                    "reference_id": "RHSA-2025:19736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19800",
                    "reference_id": "RHSA-2025:19800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19832",
                    "reference_id": "RHSA-2025:19832",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19832"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19855",
                    "reference_id": "RHSA-2025:19855",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19855"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19856",
                    "reference_id": "RHSA-2025:19856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19856"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19948",
                    "reference_id": "RHSA-2025:19948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:20962",
                    "reference_id": "RHSA-2025:20962",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:20962"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21036",
                    "reference_id": "RHSA-2025:21036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21036"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21696",
                    "reference_id": "RHSA-2025:21696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7960-1/",
                    "reference_id": "USN-7960-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7960-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64226?format=api",
                    "purl": "pkg:gem/rack@3.1.18",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64227?format=api",
                    "purl": "pkg:gem/rack@3.2.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.2.3"
                }
            ],
            "aliases": [
                "CVE-2025-61919",
                "GHSA-6xw4-3v39-52mm"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s971-gkdg-jkhc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/21804?format=api",
            "vulnerability_id": "VCID-skxv-7he3-xqgc",
            "summary": "Stored XSS in Rack::Directory via javascript: filenames rendered into anchor href\n## Summary\n\n`Rack::Directory` generates an HTML directory index where each file entry is rendered as a clickable link. If a file exists on disk whose basename begins with the `javascript:` scheme (e.g. `javascript:alert(1)`), the generated index includes an anchor whose `href` attribute is exactly `javascript:alert(1)`. Clicking this entry executes arbitrary JavaScript in the context of the hosting application.\n\nThis results in a client-side XSS condition in directory listings generated by `Rack::Directory`.\n\n## Details\n\n`Rack::Directory` renders directory entries using an HTML row template similar to:\n\n```html\n<a href='%s'>%s</a>\n```\n\nThe `%s` placeholder is populated directly with the file’s basename. If the basename begins with `javascript:`, the resulting HTML contains an executable JavaScript URL:\n\n```html\n<a href='javascript:alert(1)'>javascript:alert(1)</a>\n```\n\nBecause the value is inserted directly into the `href` attribute without scheme validation or normalization, browsers interpret it as a JavaScript URI. When a user clicks the link, the JavaScript executes in the origin of the Rack application.\n\n## Impact\n\nIf `Rack::Directory` is used to expose filesystem contents over HTTP, an attacker who can create or upload files within that directory may introduce a malicious filename beginning with `javascript:`.\n\nWhen a user visits the directory listing and clicks the entry, arbitrary JavaScript executes in the application's origin. Exploitation requires user interaction (clicking the malicious entry).\n\n## Mitigation\n\n* Update to a patched version of Rack in which `Rack::Directory` prefixes generated anchors with a relative path indicator (e.g. `./filename`).\n* Avoid exposing user-controlled directories via `Rack::Directory`.\n* Apply a strict Content Security Policy (CSP) to reduce impact of potential client-side execution issues.\n* Where feasible, restrict or sanitize uploaded filenames to disallow dangerous URI scheme prefixes.\n\nHackerOne profile:\nhttps://hackerone.com/thesmartshadow\n\nGitHub account owner:\nAli Firas (@thesmartshadow)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25500.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25500.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05751",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05787",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05793",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05801",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05797",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05758",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05724",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05822",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25500"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/f2f225f297b99fbee3d9f51255d41f601fc40aff",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T19:42:04Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/f2f225f297b99fbee3d9f51255d41f601fc40aff"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-whrj-4476-wvmp",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T19:42:04Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-whrj-4476-wvmp"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2026-25500.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2026-25500.yml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25500"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128480",
                    "reference_id": "1128480",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128480"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440738",
                    "reference_id": "2440738",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440738"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-whrj-4476-wvmp",
                    "reference_id": "GHSA-whrj-4476-wvmp",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-whrj-4476-wvmp"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8066-1/",
                    "reference_id": "USN-8066-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8066-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64152?format=api",
                    "purl": "pkg:gem/rack@3.1.20",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.20"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/64153?format=api",
                    "purl": "pkg:gem/rack@3.2.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.2.5"
                }
            ],
            "aliases": [
                "CVE-2026-25500",
                "GHSA-whrj-4476-wvmp"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-skxv-7he3-xqgc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/29211?format=api",
            "vulnerability_id": "VCID-wt7k-s1yd-nke6",
            "summary": "Local File Inclusion in Rack::Static\n## Summary\n\n`Rack::Static` can serve files under the specified `root:` even if `urls:` are provided, which may expose other files under the specified `root:` unexpectedly.\n\n## Details\n\nThe vulnerability occurs because `Rack::Static` does not properly sanitize user-supplied paths before serving files. Specifically, encoded path traversal sequences are not correctly validated, allowing attackers to access files outside the designated static file directory.\n\n## Impact\n\nBy exploiting this vulnerability, an attacker can gain access to all files under the specified `root:` directory, provided they are able to determine then path of the file.\n\n## Mitigation\n\n- Update to the latest version of Rack, or\n- Remove usage of `Rack::Static`, or\n- Ensure that `root:` points at a directory path which only contains files which should be accessed publicly.\n\nIt is likely that a CDN or similar static file server would also mitigate the issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27610.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27610.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61706",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61664",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61684",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61695",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61659",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61674",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6164",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61611",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/50caab74fa01ee8f5dbdee7bb2782126d20c6583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:22:45Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/50caab74fa01ee8f5dbdee7bb2782126d20c6583"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-7wqh-767x-r66v",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:22:45Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-7wqh-767x-r66v"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-27610.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-27610.yml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00016.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00016.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27610"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100444",
                    "reference_id": "1100444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100444"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351231",
                    "reference_id": "2351231",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351231"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7wqh-767x-r66v",
                    "reference_id": "GHSA-7wqh-767x-r66v",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7wqh-767x-r66v"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3448",
                    "reference_id": "RHSA-2025:3448",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3448"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3490",
                    "reference_id": "RHSA-2025:3490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3491",
                    "reference_id": "RHSA-2025:3491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3492",
                    "reference_id": "RHSA-2025:3492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3906",
                    "reference_id": "RHSA-2025:3906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3906"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4576",
                    "reference_id": "RHSA-2025:4576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4576"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7366-1/",
                    "reference_id": "USN-7366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7366-2/",
                    "reference_id": "USN-7366-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7366-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/70076?format=api",
                    "purl": "pkg:gem/rack@3.0.14",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-47ja-djzb-2bbw"
                        },
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.14"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/70077?format=api",
                    "purl": "pkg:gem/rack@3.1.12",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-47ja-djzb-2bbw"
                        },
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.12"
                }
            ],
            "aliases": [
                "CVE-2025-27610",
                "GHSA-7wqh-767x-r66v"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wt7k-s1yd-nke6"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/26273?format=api",
            "vulnerability_id": "VCID-w732-52bx-2qf8",
            "summary": "Possible Log Injection in Rack::CommonLogger\n## Summary\n\n`Rack::CommonLogger` can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs.\n\n## Details\n\nWhen a user provides the authorization credentials via `Rack::Auth::Basic`, if success, the username will be put in `env['REMOTE_USER']` and later be used by `Rack::CommonLogger` for logging purposes.\n\nThe issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile.\n\n## Impact\n\nAttackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files.\n\n## Mitigation\n\n- Update to the latest version of Rack.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-25184.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-25184.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-25184",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77455",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77416",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7742",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7744",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77414",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77405",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77375",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77685",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77658",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-25184"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25184",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25184"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/074ae244430cda05c27ca91cda699709cfb3ad8e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T19:09:07Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/074ae244430cda05c27ca91cda699709cfb3ad8e"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-7g2v-jj9q-g3rg",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T19:09:07Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-7g2v-jj9q-g3rg"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-25184.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-25184.yml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00016.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00016.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25184",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25184"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098257",
                    "reference_id": "1098257",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098257"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345301",
                    "reference_id": "2345301",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345301"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7g2v-jj9q-g3rg",
                    "reference_id": "GHSA-7g2v-jj9q-g3rg",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7g2v-jj9q-g3rg"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1985",
                    "reference_id": "RHSA-2025:1985",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1985"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7085",
                    "reference_id": "RHSA-2025:7085",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7085"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7366-1/",
                    "reference_id": "USN-7366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7366-2/",
                    "reference_id": "USN-7366-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7366-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/69400?format=api",
                    "purl": "pkg:gem/rack@2.2.11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-47ja-djzb-2bbw"
                        },
                        {
                            "vulnerability": "VCID-7p12-ejdu-uqgy"
                        },
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-gdhf-e8q1-kbat"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        },
                        {
                            "vulnerability": "VCID-wt7k-s1yd-nke6"
                        },
                        {
                            "vulnerability": "VCID-xazq-qrm1-9ff6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@2.2.11"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/67812?format=api",
                    "purl": "pkg:gem/rack@3.0.0.beta1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-7p12-ejdu-uqgy"
                        },
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-arac-j5h5-zkcu"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c21j-snf1-d3cb"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-gtzk-m9rm-57hw"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        },
                        {
                            "vulnerability": "VCID-vkrw-y1j6-6fe7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        },
                        {
                            "vulnerability": "VCID-xkah-9nv9-wufd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.0.beta1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/69401?format=api",
                    "purl": "pkg:gem/rack@3.0.12",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-47ja-djzb-2bbw"
                        },
                        {
                            "vulnerability": "VCID-7p12-ejdu-uqgy"
                        },
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        },
                        {
                            "vulnerability": "VCID-wt7k-s1yd-nke6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.12"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/69402?format=api",
                    "purl": "pkg:gem/rack@3.1.10",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-47ja-djzb-2bbw"
                        },
                        {
                            "vulnerability": "VCID-7p12-ejdu-uqgy"
                        },
                        {
                            "vulnerability": "VCID-7wvj-9h3p-23am"
                        },
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-azu5-jcmd-3ufx"
                        },
                        {
                            "vulnerability": "VCID-c5sc-7qnn-mkb9"
                        },
                        {
                            "vulnerability": "VCID-d58r-22kr-9bct"
                        },
                        {
                            "vulnerability": "VCID-npag-sz7d-v7b6"
                        },
                        {
                            "vulnerability": "VCID-s971-gkdg-jkhc"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        },
                        {
                            "vulnerability": "VCID-wt7k-s1yd-nke6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.10"
                }
            ],
            "aliases": [
                "CVE-2025-25184",
                "GHSA-7g2v-jj9q-g3rg"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w732-52bx-2qf8"
        }
    ],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.0.12"
}