{"api_version":"1","generated_at":"2026-04-23T03:26:23+00:00","cve":"CVE-2024-26146","urls":{"html":"https://cve.report/CVE-2024-26146","api":"https://cve.report/api/cve/CVE-2024-26146.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-26146","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-26146"},"summary":{"title":"CVE-2024-26146","description":"Description unavailable.","state":"PUBLISHED","assigner":"","published_at":"2024-02-29 00:15:00","updated_at":"2024-02-29 13:49:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f","name":"https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd","name":"https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f","name":"https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716","name":"https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582","name":"https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942","name":"https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml","name":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-26146","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26146","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2024-26146","qid":"200188","title":"Ubuntu Security Notification for Rack Vulnerabilities (USN-6689-1)"},{"cve":"CVE-2024-26146","qid":"357336","title":"Amazon Linux Security Advisory for pcs : ALAS2-2024-2492"},{"cve":"CVE-2024-26146","qid":"755907","title":"SUSE Enterprise Linux Security Update for rubygem-rack (SUSE-SU-2024:0765-1)"},{"cve":"CVE-2024-26146","qid":"997566","title":"Rubygems (Rubygems) Security Update for rack (GHSA-54rr-7fvw-6x8f)"}]},"source_records":{"cve_program":null,"nvd":{"publishedDate":"2024-02-29 00:15:00","lastModifiedDate":"2024-02-29 13:49:00","problem_types":[],"metrics":[],"configurations":{"CVE_data_version":"4.0","nodes":[]}},"legacy_mitre":{"record":null,"notes":[]}}}