Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2022-44570

A denial of service vulnerability in the Range header parsing component of Rack >= 1.5.0. A Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.017
EPSS Ranking 81.6%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2022-44570
  • Rack » Rack » Version: 1.5.0
    cpe:2.3:a:rack:rack:1.5.0
  • Rack » Rack » Version: 1.5.1
    cpe:2.3:a:rack:rack:1.5.1
  • Rack » Rack » Version: 1.5.2
    cpe:2.3:a:rack:rack:1.5.2
  • Rack » Rack » Version: 1.5.3
    cpe:2.3:a:rack:rack:1.5.3
  • Rack » Rack » Version: 1.5.4
    cpe:2.3:a:rack:rack:1.5.4
  • Rack » Rack » Version: 1.5.5
    cpe:2.3:a:rack:rack:1.5.5
  • Rack » Rack » Version: 1.6.0
    cpe:2.3:a:rack:rack:1.6.0
  • Rack » Rack » Version: 1.6.1
    cpe:2.3:a:rack:rack:1.6.1
  • Rack » Rack » Version: 1.6.10
    cpe:2.3:a:rack:rack:1.6.10
  • Rack » Rack » Version: 1.6.11
    cpe:2.3:a:rack:rack:1.6.11
  • Rack » Rack » Version: 1.6.12
    cpe:2.3:a:rack:rack:1.6.12
  • Rack » Rack » Version: 1.6.13
    cpe:2.3:a:rack:rack:1.6.13
  • Rack » Rack » Version: 1.6.2
    cpe:2.3:a:rack:rack:1.6.2
  • Rack » Rack » Version: 1.6.3
    cpe:2.3:a:rack:rack:1.6.3
  • Rack » Rack » Version: 1.6.4
    cpe:2.3:a:rack:rack:1.6.4
  • Rack » Rack » Version: 1.6.5
    cpe:2.3:a:rack:rack:1.6.5
  • Rack » Rack » Version: 1.6.6
    cpe:2.3:a:rack:rack:1.6.6
  • Rack » Rack » Version: 1.6.7
    cpe:2.3:a:rack:rack:1.6.7
  • Rack » Rack » Version: 1.6.8
    cpe:2.3:a:rack:rack:1.6.8
  • Rack » Rack » Version: 1.6.9
    cpe:2.3:a:rack:rack:1.6.9
  • Rack » Rack » Version: 2.0.0
    cpe:2.3:a:rack:rack:2.0.0
  • Rack » Rack » Version: 2.0.1
    cpe:2.3:a:rack:rack:2.0.1
  • Rack » Rack » Version: 2.0.2
    cpe:2.3:a:rack:rack:2.0.2
  • Rack » Rack » Version: 2.0.3
    cpe:2.3:a:rack:rack:2.0.3
  • Rack » Rack » Version: 2.0.4
    cpe:2.3:a:rack:rack:2.0.4
  • Rack » Rack » Version: 2.0.5
    cpe:2.3:a:rack:rack:2.0.5
  • Rack » Rack » Version: 2.0.6
    cpe:2.3:a:rack:rack:2.0.6
  • Rack » Rack » Version: 2.0.7
    cpe:2.3:a:rack:rack:2.0.7
  • Rack » Rack » Version: 2.0.8
    cpe:2.3:a:rack:rack:2.0.8
  • Rack » Rack » Version: 2.0.9
    cpe:2.3:a:rack:rack:2.0.9
  • Rack » Rack » Version: 2.1.0
    cpe:2.3:a:rack:rack:2.1.0
  • Rack » Rack » Version: 2.1.1
    cpe:2.3:a:rack:rack:2.1.1
  • Rack » Rack » Version: 2.1.2
    cpe:2.3:a:rack:rack:2.1.2
  • Rack » Rack » Version: 2.1.3
    cpe:2.3:a:rack:rack:2.1.3
  • Rack » Rack » Version: 2.1.4
    cpe:2.3:a:rack:rack:2.1.4
  • Rack » Rack » Version: 2.2.0
    cpe:2.3:a:rack:rack:2.2.0
  • Rack » Rack » Version: 2.2.1
    cpe:2.3:a:rack:rack:2.2.1
  • Rack » Rack » Version: 2.2.2
    cpe:2.3:a:rack:rack:2.2.2
  • Rack » Rack » Version: 2.2.3
    cpe:2.3:a:rack:rack:2.2.3
  • Rack » Rack » Version: 2.2.4
    cpe:2.3:a:rack:rack:2.2.4
  • Rack » Rack » Version: 2.2.4.1
    cpe:2.3:a:rack:rack:2.2.4.1
  • Rack » Rack » Version: 2.2.5
    cpe:2.3:a:rack:rack:2.2.5
  • Rack » Rack » Version: 2.2.6
    cpe:2.3:a:rack:rack:2.2.6
  • Rack » Rack » Version: 3.0.0
    cpe:2.3:a:rack:rack:3.0.0
  • Rack » Rack » Version: 3.0.1
    cpe:2.3:a:rack:rack:3.0.1
  • Rack » Rack » Version: 3.0.2
    cpe:2.3:a:rack:rack:3.0.2
  • Rack » Rack » Version: 3.0.3
    cpe:2.3:a:rack:rack:3.0.3
  • Rack » Rack » Version: 3.0.4
    cpe:2.3:a:rack:rack:3.0.4


Contact Us

Shodan ® - All rights reserved