Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/ruby-rack@0?distro=trixie |
| Type | deb |
| Namespace | debian |
| Name | ruby-rack |
| Version | 0 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 1.4.0-1 |
| Latest_non_vulnerable_version | 3.2.6-2 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-7wvj-9h3p-23am |
| vulnerability_id |
VCID-7wvj-9h3p-23am |
| summary |
ReDoS Vulnerability in Rack::Multipart handle_mime_head
### Summary
There is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571.
### Details
Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.
### Credits
Thanks to [scyoon](https://hackerone.com/scyoon) for reporting this to the Rails security team |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-49007 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.68589 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.68611 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.686 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.6856 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.6859 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.68602 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.68576 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.68558 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.68507 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.6851 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.68528 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-49007 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/rack/rack |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/rack/rack |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-49007, GHSA-47m2-26rw-j2jw
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7wvj-9h3p-23am |
|
| 1 |
| url |
VCID-stpq-7qys-t3cf |
| vulnerability_id |
VCID-stpq-7qys-t3cf |
| summary |
Rack ReDoS Vulnerability in HTTP Accept Headers Parsing
### Summary
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an attacker sending specially crafted `Accept-Encoding` or `Accept-Language` headers, causing the server to spend excessive time processing the request and leading to a Denial of Service (DoS).
### Details
The fix for https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f was not applied to the main branch and thus while the issue was fixed for the Rack v3.0 release series, it was not fixed in the v3.1 release series until v3.1.5. |
| references |
| 0 |
| reference_url |
https://advisory.dw1.io/61 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://advisory.dw1.io/61 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-39316 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74633 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74626 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74588 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74597 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74617 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74594 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74579 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74547 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74572 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74546 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74624 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-39316 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-39316, GHSA-cj83-2ww7-mvq7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-stpq-7qys-t3cf |
|
| 2 |
| url |
VCID-sw69-1r7d-kkht |
| vulnerability_id |
VCID-sw69-1r7d-kkht |
| summary |
Uncontrolled Resource Consumption
There is a possible DoS vulnerability in the multipart parser in Rack. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16470 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.3932 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39267 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39285 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39324 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39312 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39296 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39241 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39327 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39303 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39117 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39202 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.3929 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16470 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-16470, GHSA-hg78-4f6x-99wq
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sw69-1r7d-kkht |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@0%3Fdistro=trixie |