Lookup for vulnerable packages by Package URL.

GET /api/packages/938338?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/938338?format=api",
    "purl": "pkg:deb/debian/ruby-rack@2.2.7-1.1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "ruby-rack",
    "version": "2.2.7-1.1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.2.13-1~deb12u1",
    "latest_non_vulnerable_version": "3.2.6-2",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15425?format=api",
            "vulnerability_id": "VCID-7zgg-tvu3-r7gt",
            "summary": "Rack vulnerable to ReDoS in content type parsing (2nd degree polynomial)\n### Summary\n\n```ruby\nmodule Rack\n  class MediaType\n    SPLIT_PATTERN = %r{\\s*[;,]\\s*}\n```\nThe above regexp is subject to ReDos. 50K blank characters as a prefix to the header will take over 10s to split.\n\n### PoC\n\nA simple HTTP request with lots of blank characters in the content-type header:\n\n```ruby\nrequest[\"Content-Type\"] = (\" \" * 50_000) + \"a,\"\n```\n\n### Impact\n\nIt's a very easy to craft ReDoS. Like all ReDoS the impact is debatable.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25126.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25126.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-25126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58929",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58895",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58915",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58932",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63673",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63621",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63689",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64281",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64253",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-25126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146"
                },
                {
                    "reference_url": "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/"
                        }
                    ],
                    "url": "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/"
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25126"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240510-0005"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516",
                    "reference_id": "1064516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265593",
                    "reference_id": "2265593",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265593"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-22f2-v57c-j9cx",
                    "reference_id": "GHSA-22f2-v57c-j9cx",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-22f2-v57c-j9cx"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0005/",
                    "reference_id": "ntap-20240510-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240510-0005/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10806",
                    "reference_id": "RHSA-2024:10806",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10806"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1841",
                    "reference_id": "RHSA-2024:1841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1846",
                    "reference_id": "RHSA-2024:1846",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1846"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2007",
                    "reference_id": "RHSA-2024:2007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2113",
                    "reference_id": "RHSA-2024:2113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2581",
                    "reference_id": "RHSA-2024:2581",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2581"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2584",
                    "reference_id": "RHSA-2024:2584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2584"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2953",
                    "reference_id": "RHSA-2024:2953",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2953"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3431",
                    "reference_id": "RHSA-2024:3431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3431"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6837-1/",
                    "reference_id": "USN-6837-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6837-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6837-2/",
                    "reference_id": "USN-6837-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6837-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7036-1/",
                    "reference_id": "USN-7036-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7036-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938322?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.1.4-3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.1.4-3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938337?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.2.6.4-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.6.4-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938338?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.2.7-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.7-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938320?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.2.20-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.20-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938325?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938323?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.1.18-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938324?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.2.5-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.5-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059652?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.2.6-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.6-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-25126",
                "GHSA-22f2-v57c-j9cx"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7zgg-tvu3-r7gt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15612?format=api",
            "vulnerability_id": "VCID-arac-j5h5-zkcu",
            "summary": "Rack has possible DoS Vulnerability with Range Header\n# Possible DoS Vulnerability with Range Header in Rack\n\nThere is a possible DoS vulnerability relating to the Range request header in\nRack.  This vulnerability has been assigned the CVE identifier CVE-2024-26141.\n\nVersions Affected:  >= 1.3.0.\nNot affected:       < 1.3.0\nFixed Versions:     3.0.9.1, 2.2.8.1\n\nImpact\n------\nCarefully crafted Range headers can cause a server to respond with an\nunexpectedly large response. Responding with such large responses could lead\nto a denial of service issue.\n\nVulnerable applications will use the `Rack::File` middleware or the\n`Rack::Utils.byte_ranges` methods (this includes Rails applications).\n\nReleases\n--------\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\nThere are no feasible workarounds for this issue.\n\nPatches\n-------\nTo aid users who aren't able to upgrade immediately we have provided patches for\nthe two supported release series. They are in git-am format and consist of a\nsingle changeset.\n\n* 3-0-range.patch - Patch for 3.0 series\n* 2-2-range.patch - Patch for 2.2 series\n\nCredits\n-------\n\nThank you [ooooooo_q](https://hackerone.com/ooooooo_q) for the report and\npatch",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26141.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26141.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59349",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59316",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59334",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5935",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60593",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60657",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60642",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61296",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61325",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146"
                },
                {
                    "reference_url": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/"
                        }
                    ],
                    "url": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/"
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26141"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516",
                    "reference_id": "1064516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265594",
                    "reference_id": "2265594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265594"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-xj5v-6v4g-jfw6",
                    "reference_id": "GHSA-xj5v-6v4g-jfw6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-xj5v-6v4g-jfw6"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0007/",
                    "reference_id": "ntap-20240510-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240510-0007/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10806",
                    "reference_id": "RHSA-2024:10806",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10806"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1841",
                    "reference_id": "RHSA-2024:1841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1846",
                    "reference_id": "RHSA-2024:1846",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1846"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2007",
                    "reference_id": "RHSA-2024:2007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2113",
                    "reference_id": "RHSA-2024:2113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2581",
                    "reference_id": "RHSA-2024:2581",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2581"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2584",
                    "reference_id": "RHSA-2024:2584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2584"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2953",
                    "reference_id": "RHSA-2024:2953",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2953"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3431",
                    "reference_id": "RHSA-2024:3431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3431"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6689-1/",
                    "reference_id": "USN-6689-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6689-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6837-1/",
                    "reference_id": "USN-6837-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6837-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6837-2/",
                    "reference_id": "USN-6837-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6837-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7036-1/",
                    "reference_id": "USN-7036-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7036-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938322?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.1.4-3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.1.4-3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938337?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.2.6.4-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.6.4-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938338?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.2.7-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.7-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938320?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.2.20-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.20-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938325?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938323?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.1.18-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938324?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.2.5-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.5-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059652?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.2.6-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.6-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-26141",
                "GHSA-xj5v-6v4g-jfw6"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-arac-j5h5-zkcu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15123?format=api",
            "vulnerability_id": "VCID-gtzk-m9rm-57hw",
            "summary": "Rack Header Parsing leads to Possible Denial of Service Vulnerability\n# Possible Denial of Service Vulnerability in Rack Header Parsing\n\nThere is a possible denial of service vulnerability in the header parsing\nroutines in Rack.  This vulnerability has been assigned the CVE identifier\nCVE-2024-26146.\n\nVersions Affected:  All.\nNot affected:       None\nFixed Versions:     2.0.9.4, 2.1.4.4, 2.2.8.1, 3.0.9.1\n\nImpact\n------\nCarefully crafted headers can cause header parsing in Rack to take longer than\nexpected resulting in a possible denial of service issue. Accept and Forwarded\nheaders are impacted.\n\nRuby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2\nor newer are unaffected.\n\nReleases\n--------\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\nThere are no feasible workarounds for this issue.\n\nPatches\n-------\nTo aid users who aren't able to upgrade immediately we have provided patches for\nthe two supported release series. They are in git-am format and consist of a\nsingle changeset.\n\n* 2-0-header-redos.patch - Patch for 2.0 series\n* 2-1-header-redos.patch - Patch for 2.1 series\n* 2-2-header-redos.patch - Patch for 2.2 series\n* 3-0-header-redos.patch - Patch for 3.0 series\n\nCredits\n-------\n\nThanks to [svalkanov](https://hackerone.com/svalkanov) for reporting this and\nproviding patches!",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26146.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26146.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26146",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71937",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71956",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72361",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72348",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7232",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72332",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73588",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73552",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73601",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26146"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146"
                },
                {
                    "reference_url": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/"
                        }
                    ],
                    "url": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rack/rack",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rack/rack"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f"
                },
                {
                    "reference_url": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd"
                },
                {
                    "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/"
                        }
                    ],
                    "url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/"
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26146",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26146"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516",
                    "reference_id": "1064516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265595",
                    "reference_id": "2265595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265595"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-54rr-7fvw-6x8f",
                    "reference_id": "GHSA-54rr-7fvw-6x8f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-54rr-7fvw-6x8f"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0006/",
                    "reference_id": "ntap-20240510-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240510-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10806",
                    "reference_id": "RHSA-2024:10806",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10806"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1841",
                    "reference_id": "RHSA-2024:1841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1846",
                    "reference_id": "RHSA-2024:1846",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1846"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2007",
                    "reference_id": "RHSA-2024:2007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2113",
                    "reference_id": "RHSA-2024:2113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2581",
                    "reference_id": "RHSA-2024:2581",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2581"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2584",
                    "reference_id": "RHSA-2024:2584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2584"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2953",
                    "reference_id": "RHSA-2024:2953",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2953"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3431",
                    "reference_id": "RHSA-2024:3431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3431"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6689-1/",
                    "reference_id": "USN-6689-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6689-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6837-1/",
                    "reference_id": "USN-6837-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6837-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6837-2/",
                    "reference_id": "USN-6837-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6837-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7036-1/",
                    "reference_id": "USN-7036-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7036-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938322?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.1.4-3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.1.4-3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938337?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.2.6.4-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.6.4-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938338?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.2.7-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.7-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938320?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@2.2.20-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.20-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938325?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938323?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.1.18-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9rpp-9xss-duf6"
                        },
                        {
                            "vulnerability": "VCID-skxv-7he3-xqgc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/938324?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.2.5-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1j61-5e8x-7fbd"
                        },
                        {
                            "vulnerability": "VCID-2p73-rc9t-rudb"
                        },
                        {
                            "vulnerability": "VCID-2qba-a6bp-ryak"
                        },
                        {
                            "vulnerability": "VCID-5twm-pqc2-xyfn"
                        },
                        {
                            "vulnerability": "VCID-dh75-6jyw-1ke2"
                        },
                        {
                            "vulnerability": "VCID-j34j-bgfd-8fez"
                        },
                        {
                            "vulnerability": "VCID-jg77-mm5c-gydu"
                        },
                        {
                            "vulnerability": "VCID-m98a-mcyb-c7fm"
                        },
                        {
                            "vulnerability": "VCID-metf-cghw-p3b5"
                        },
                        {
                            "vulnerability": "VCID-p3dk-p1gb-kkem"
                        },
                        {
                            "vulnerability": "VCID-pbu7-4hdm-s3a6"
                        },
                        {
                            "vulnerability": "VCID-pnz8-yes1-pfc7"
                        },
                        {
                            "vulnerability": "VCID-wvs1-dhwp-ebat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.5-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059652?format=api",
                    "purl": "pkg:deb/debian/ruby-rack@3.2.6-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.6-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-26146",
                "GHSA-54rr-7fvw-6x8f"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gtzk-m9rm-57hw"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.7-1.1%3Fdistro=trixie"
}