Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-34785 | 7.5 HIGH | Rack: Local file inclusion in `Rack::Static` via URL Prefix Matching |
| CVE-2026-34827 | 7.5 HIGH | Rack: Algorithmic-Complexity DoS in Rack::Multipart::Parser |
| CVE-2026-34829 | 7.5 HIGH | Rack: Denial of Service via Unbounded Multipart File Upload Without Content-Length |
| CVE-2026-34830 | 5.9 MEDIUM | Rack: Rack::Sendfile regex injection via HTTP_X_ACCEL_MAPPING header allows arbitrary file |
| CVE-2026-34826 | 5.3 MEDIUM | Rack: Unbounded Range Count in get_byte_ranges Enables DoS |
| CVE-2026-34763 | 5.3 MEDIUM | Rack: Rack::Directory info disclosure and DoS via unescaped regex interpolation |
| CVE-2026-34230 | 5.3 MEDIUM | Rack: Quadratic complexity in Rack::Utils.select_best_encoding via wildcard Accept-Encodin |
| CVE-2026-26962 | 4.8 MEDIUM | Rack: Header injection in multipart requests |
| CVE-2026-32762 | 4.8 MEDIUM | Rack: Forwarded Header semicolon injection enables Host and Scheme spoofing |
| CVE-2026-34835 | 4.8 MEDIUM | Rack: `Rack::Request` accepts invalid Host characters, enabling host allowlist bypass. |
| CVE-2026-34831 | 4.8 MEDIUM | Rack: Content-Length mismatch in Rack::Files error responses |
| CVE-2026-26961 | 3.7 LOW | Rack: Multipart Boundary Parsing Ambiguity allowing WAF Bypass |
No comments yet