Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/938338?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/938338?format=api", "purl": "pkg:deb/debian/ruby-rack@2.2.7-1.1?distro=trixie", "type": "deb", "namespace": "debian", "name": "ruby-rack", "version": "2.2.7-1.1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.2.13-1~deb12u1", "latest_non_vulnerable_version": "3.2.6-2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15425?format=api", "vulnerability_id": "VCID-7zgg-tvu3-r7gt", "summary": "Rack vulnerable to ReDoS in content type parsing (2nd degree polynomial)\n### Summary\n\n```ruby\nmodule Rack\n class MediaType\n SPLIT_PATTERN = %r{\\s*[;,]\\s*}\n```\nThe above regexp is subject to ReDos. 50K blank characters as a prefix to the header will take over 10s to split.\n\n### PoC\n\nA simple HTTP request with lots of blank characters in the content-type header:\n\n```ruby\nrequest[\"Content-Type\"] = (\" \" * 50_000) + \"a,\"\n```\n\n### Impact\n\nIt's a very easy to craft ReDoS. Like all ReDoS the impact is debatable.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-25126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58929", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58915", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63621", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64253", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-25126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146" }, { "reference_url": "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/rack/rack", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rack/rack" }, { "reference_url": "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462" }, { "reference_url": "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49" }, { "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx" }, { "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25126", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25126" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0005", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240510-0005" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516", "reference_id": "1064516", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265593", "reference_id": "2265593", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265593" }, { "reference_url": "https://github.com/advisories/GHSA-22f2-v57c-j9cx", "reference_id": "GHSA-22f2-v57c-j9cx", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-22f2-v57c-j9cx" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0005/", "reference_id": "ntap-20240510-0005", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-12T17:41:06Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240510-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10806", "reference_id": "RHSA-2024:10806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1841", "reference_id": "RHSA-2024:1841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1846", "reference_id": "RHSA-2024:1846", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1846" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2007", "reference_id": "RHSA-2024:2007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2113", "reference_id": "RHSA-2024:2113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2581", "reference_id": "RHSA-2024:2581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2584", "reference_id": "RHSA-2024:2584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2953", "reference_id": "RHSA-2024:2953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3431", "reference_id": "RHSA-2024:3431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3431" }, { "reference_url": "https://usn.ubuntu.com/6837-1/", "reference_id": "USN-6837-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6837-1/" }, { "reference_url": "https://usn.ubuntu.com/6837-2/", "reference_id": "USN-6837-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6837-2/" }, { "reference_url": "https://usn.ubuntu.com/7036-1/", "reference_id": "USN-7036-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7036-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938322?format=api", "purl": "pkg:deb/debian/ruby-rack@2.1.4-3%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.1.4-3%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938337?format=api", "purl": "pkg:deb/debian/ruby-rack@2.2.6.4-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.6.4-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938338?format=api", "purl": "pkg:deb/debian/ruby-rack@2.2.7-1.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.7-1.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938320?format=api", "purl": "pkg:deb/debian/ruby-rack@2.2.20-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.20-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938325?format=api", "purl": "pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938323?format=api", "purl": "pkg:deb/debian/ruby-rack@3.1.18-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-9rpp-9xss-duf6" }, { "vulnerability": "VCID-skxv-7he3-xqgc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938324?format=api", "purl": "pkg:deb/debian/ruby-rack@3.2.5-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.5-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059652?format=api", "purl": "pkg:deb/debian/ruby-rack@3.2.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.6-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-25126", "GHSA-22f2-v57c-j9cx" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7zgg-tvu3-r7gt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15612?format=api", "vulnerability_id": "VCID-arac-j5h5-zkcu", "summary": "Rack has possible DoS Vulnerability with Range Header\n# Possible DoS Vulnerability with Range Header in Rack\n\nThere is a possible DoS vulnerability relating to the Range request header in\nRack. This vulnerability has been assigned the CVE identifier CVE-2024-26141.\n\nVersions Affected: >= 1.3.0.\nNot affected: < 1.3.0\nFixed Versions: 3.0.9.1, 2.2.8.1\n\nImpact\n------\nCarefully crafted Range headers can cause a server to respond with an\nunexpectedly large response. Responding with such large responses could lead\nto a denial of service issue.\n\nVulnerable applications will use the `Rack::File` middleware or the\n`Rack::Utils.byte_ranges` methods (this includes Rails applications).\n\nReleases\n--------\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\nThere are no feasible workarounds for this issue.\n\nPatches\n-------\nTo aid users who aren't able to upgrade immediately we have provided patches for\nthe two supported release series. They are in git-am format and consist of a\nsingle changeset.\n\n* 3-0-range.patch - Patch for 3.0 series\n* 2-2-range.patch - Patch for 2.2 series\n\nCredits\n-------\n\nThank you [ooooooo_q](https://hackerone.com/ooooooo_q) for the report and\npatch", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26141.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26141.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26141", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59349", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59316", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59334", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5935", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60657", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00399", "scoring_system": "epss", "scoring_elements": "0.60642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61296", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61325", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26141" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146" }, { "reference_url": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/" } ], "url": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/rack/rack", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rack/rack" }, { "reference_url": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/" } ], "url": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9" }, { "reference_url": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/" } ], "url": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b" }, { "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/" } ], "url": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6" }, { "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/" } ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26141", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26141" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516", "reference_id": "1064516", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265594", "reference_id": "2265594", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265594" }, { "reference_url": "https://github.com/advisories/GHSA-xj5v-6v4g-jfw6", "reference_id": "GHSA-xj5v-6v4g-jfw6", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-xj5v-6v4g-jfw6" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0007/", "reference_id": "ntap-20240510-0007", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-05T18:23:59Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240510-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10806", "reference_id": "RHSA-2024:10806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1841", "reference_id": "RHSA-2024:1841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1846", "reference_id": "RHSA-2024:1846", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1846" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2007", "reference_id": "RHSA-2024:2007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2113", "reference_id": "RHSA-2024:2113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2581", "reference_id": "RHSA-2024:2581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2584", "reference_id": "RHSA-2024:2584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2953", "reference_id": "RHSA-2024:2953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3431", "reference_id": "RHSA-2024:3431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3431" }, { "reference_url": "https://usn.ubuntu.com/6689-1/", "reference_id": "USN-6689-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6689-1/" }, { "reference_url": "https://usn.ubuntu.com/6837-1/", "reference_id": "USN-6837-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6837-1/" }, { "reference_url": "https://usn.ubuntu.com/6837-2/", "reference_id": "USN-6837-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6837-2/" }, { "reference_url": "https://usn.ubuntu.com/7036-1/", "reference_id": "USN-7036-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7036-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938322?format=api", "purl": "pkg:deb/debian/ruby-rack@2.1.4-3%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.1.4-3%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938337?format=api", "purl": "pkg:deb/debian/ruby-rack@2.2.6.4-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.6.4-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938338?format=api", "purl": "pkg:deb/debian/ruby-rack@2.2.7-1.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.7-1.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938320?format=api", "purl": "pkg:deb/debian/ruby-rack@2.2.20-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.20-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938325?format=api", "purl": "pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938323?format=api", "purl": "pkg:deb/debian/ruby-rack@3.1.18-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-9rpp-9xss-duf6" }, { "vulnerability": "VCID-skxv-7he3-xqgc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938324?format=api", "purl": "pkg:deb/debian/ruby-rack@3.2.5-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.5-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059652?format=api", "purl": "pkg:deb/debian/ruby-rack@3.2.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.6-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-26141", "GHSA-xj5v-6v4g-jfw6" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-arac-j5h5-zkcu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15123?format=api", "vulnerability_id": "VCID-gtzk-m9rm-57hw", "summary": "Rack Header Parsing leads to Possible Denial of Service Vulnerability\n# Possible Denial of Service Vulnerability in Rack Header Parsing\n\nThere is a possible denial of service vulnerability in the header parsing\nroutines in Rack. This vulnerability has been assigned the CVE identifier\nCVE-2024-26146.\n\nVersions Affected: All.\nNot affected: None\nFixed Versions: 2.0.9.4, 2.1.4.4, 2.2.8.1, 3.0.9.1\n\nImpact\n------\nCarefully crafted headers can cause header parsing in Rack to take longer than\nexpected resulting in a possible denial of service issue. Accept and Forwarded\nheaders are impacted.\n\nRuby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2\nor newer are unaffected.\n\nReleases\n--------\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\nThere are no feasible workarounds for this issue.\n\nPatches\n-------\nTo aid users who aren't able to upgrade immediately we have provided patches for\nthe two supported release series. They are in git-am format and consist of a\nsingle changeset.\n\n* 2-0-header-redos.patch - Patch for 2.0 series\n* 2-1-header-redos.patch - Patch for 2.1 series\n* 2-2-header-redos.patch - Patch for 2.2 series\n* 3-0-header-redos.patch - Patch for 3.0 series\n\nCredits\n-------\n\nThanks to [svalkanov](https://hackerone.com/svalkanov) for reporting this and\nproviding patches!", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26146.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26146.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71937", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71956", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72361", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72348", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.7232", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72332", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73588", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00775", "scoring_system": "epss", "scoring_elements": "0.73601", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-26146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146" }, { "reference_url": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/" } ], "url": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/rack/rack", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rack/rack" }, { "reference_url": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/" } ], "url": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716" }, { "reference_url": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/" } ], "url": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582" }, { "reference_url": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/" } ], "url": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f" }, { "reference_url": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/" } ], "url": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd" }, { "reference_url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/" } ], "url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f" }, { "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/" } ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26146", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26146" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516", "reference_id": "1064516", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064516" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265595", "reference_id": "2265595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265595" }, { "reference_url": "https://github.com/advisories/GHSA-54rr-7fvw-6x8f", "reference_id": "GHSA-54rr-7fvw-6x8f", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-54rr-7fvw-6x8f" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0006/", "reference_id": "ntap-20240510-0006", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-29T17:31:54Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240510-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10806", "reference_id": "RHSA-2024:10806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10806" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1841", "reference_id": "RHSA-2024:1841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1846", "reference_id": "RHSA-2024:1846", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1846" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2007", "reference_id": "RHSA-2024:2007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2113", "reference_id": "RHSA-2024:2113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2581", "reference_id": "RHSA-2024:2581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2584", "reference_id": "RHSA-2024:2584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2953", "reference_id": "RHSA-2024:2953", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3431", "reference_id": "RHSA-2024:3431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3431" }, { "reference_url": "https://usn.ubuntu.com/6689-1/", "reference_id": "USN-6689-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6689-1/" }, { "reference_url": "https://usn.ubuntu.com/6837-1/", "reference_id": "USN-6837-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6837-1/" }, { "reference_url": "https://usn.ubuntu.com/6837-2/", "reference_id": "USN-6837-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6837-2/" }, { "reference_url": "https://usn.ubuntu.com/7036-1/", "reference_id": "USN-7036-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7036-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938322?format=api", "purl": "pkg:deb/debian/ruby-rack@2.1.4-3%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.1.4-3%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938337?format=api", "purl": "pkg:deb/debian/ruby-rack@2.2.6.4-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.6.4-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938338?format=api", "purl": "pkg:deb/debian/ruby-rack@2.2.7-1.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.7-1.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938320?format=api", "purl": "pkg:deb/debian/ruby-rack@2.2.20-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.20-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938325?format=api", "purl": "pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938323?format=api", "purl": "pkg:deb/debian/ruby-rack@3.1.18-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-9rpp-9xss-duf6" }, { "vulnerability": "VCID-skxv-7he3-xqgc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.1.18-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938324?format=api", "purl": "pkg:deb/debian/ruby-rack@3.2.5-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1j61-5e8x-7fbd" }, { "vulnerability": "VCID-2p73-rc9t-rudb" }, { "vulnerability": "VCID-2qba-a6bp-ryak" }, { "vulnerability": "VCID-5twm-pqc2-xyfn" }, { "vulnerability": "VCID-dh75-6jyw-1ke2" }, { "vulnerability": "VCID-j34j-bgfd-8fez" }, { "vulnerability": "VCID-jg77-mm5c-gydu" }, { "vulnerability": "VCID-m98a-mcyb-c7fm" }, { "vulnerability": "VCID-metf-cghw-p3b5" }, { "vulnerability": "VCID-p3dk-p1gb-kkem" }, { "vulnerability": "VCID-pbu7-4hdm-s3a6" }, { "vulnerability": "VCID-pnz8-yes1-pfc7" }, { "vulnerability": "VCID-wvs1-dhwp-ebat" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.5-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059652?format=api", "purl": "pkg:deb/debian/ruby-rack@3.2.6-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@3.2.6-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-26146", "GHSA-54rr-7fvw-6x8f" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gtzk-m9rm-57hw" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rack@2.2.7-1.1%3Fdistro=trixie" }