{"api_version":"1","generated_at":"2026-04-23T01:15:13+00:00","cve":"CVE-2024-26141","urls":{"html":"https://cve.report/CVE-2024-26141","api":"https://cve.report/api/cve/CVE-2024-26141.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-26141","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-26141"},"summary":{"title":"CVE-2024-26141","description":"Description unavailable.","state":"PUBLISHED","assigner":"","published_at":"2024-02-29 00:15:00","updated_at":"2024-02-29 13:49:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6","name":"https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml","name":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944","name":"https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944","refsource":"","tags":[],"title":"Possible DoS Vulnerability with Range Header in Rack - Security Announcements - Ruby on Rails Discussions","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b","name":"https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b","refsource":"","tags":[],"title":"Return an empty array when ranges are too large · rack/rack@6245768 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9","name":"https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-26141","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26141","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2024-26141","qid":"200188","title":"Ubuntu Security Notification for Rack Vulnerabilities (USN-6689-1)"},{"cve":"CVE-2024-26141","qid":"357336","title":"Amazon Linux Security Advisory for pcs : ALAS2-2024-2492"},{"cve":"CVE-2024-26141","qid":"755907","title":"SUSE Enterprise Linux Security Update for rubygem-rack (SUSE-SU-2024:0765-1)"},{"cve":"CVE-2024-26141","qid":"997568","title":"Rubygems (Rubygems) Security Update for rack (GHSA-xj5v-6v4g-jfw6)"}]},"source_records":{"cve_program":null,"nvd":{"publishedDate":"2024-02-29 00:15:00","lastModifiedDate":"2024-02-29 13:49:00","problem_types":[],"metrics":[],"configurations":{"CVE_data_version":"4.0","nodes":[]}},"legacy_mitre":{"record":null,"notes":[]}}}