Lookup for vulnerable packages by Package URL.
| Purl | pkg:alpm/archlinux/gitlab@13.9.4-1 |
| Type | alpm |
| Namespace | archlinux |
| Name | gitlab |
| Version | 13.9.4-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 13.10.1-1 |
| Latest_non_vulnerable_version | 15.2.1-1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-21su-ba8v-huay |
| vulnerability_id |
VCID-21su-ba8v-huay |
| summary |
An issue has been discovered in GitLab CE/EE affecting all previous versions. If the victim is an admin, it was possible to issue a CSRF in System hooks through the API. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22202 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36045 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.3623 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.3642 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36453 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36288 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36336 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36357 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36364 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36327 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36306 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36348 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36332 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36277 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22202 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22202
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-21su-ba8v-huay |
|
| 1 |
| url |
VCID-2978-z7hp-tked |
| vulnerability_id |
VCID-2978-z7hp-tked |
| summary |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4. It was possible to exploit a stored cross-site-scripting in merge request via a specifically crafted branch name. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22196 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.40856 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.4095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41031 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41063 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.40989 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41038 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41045 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41064 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41029 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41012 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41054 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41025 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.40949 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22196 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22196
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2978-z7hp-tked |
|
| 2 |
| url |
VCID-2tqx-h18v-kbcg |
| vulnerability_id |
VCID-2tqx-h18v-kbcg |
| summary |
An issue has been discovered in GitLab CE/EE affecting all versions from 13.8 and above allowing an authenticated user to delete incident metric images of public projects. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22198 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53323 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53244 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53268 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53294 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53262 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53314 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53309 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.5336 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53344 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53327 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53365 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.5337 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53351 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22198 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22198
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2tqx-h18v-kbcg |
|
| 3 |
| url |
VCID-396g-fjpn-qucv |
| vulnerability_id |
VCID-396g-fjpn-qucv |
| summary |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9. A specially crafted import file could read files on the server. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22201 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92632 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92579 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92584 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92591 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92592 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92603 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92608 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92614 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92627 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92626 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0899 |
| scoring_system |
epss |
| scoring_elements |
0.92629 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22201 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22201
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-396g-fjpn-qucv |
|
| 4 |
| url |
VCID-3buj-yj37-mkbs |
| vulnerability_id |
VCID-3buj-yj37-mkbs |
| summary |
An issue has been discovered in GitLab affecting all versions starting with 12.9. GitLab was vulnerable to a stored XSS if scoped labels were used. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22199 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38002 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38161 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38298 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38321 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.3819 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.3824 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38248 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38267 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38231 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38207 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38254 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38234 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38166 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22199 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22199
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3buj-yj37-mkbs |
|
| 5 |
| url |
VCID-gwem-yat3-ebat |
| vulnerability_id |
VCID-gwem-yat3-ebat |
| summary |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.6 where an infinite loop exist when an authenticated user with specific rights access a MR having source and target branch pointing to each other |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57622 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57546 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57631 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57652 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57628 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57682 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57685 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.577 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57679 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57659 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57689 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57664 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22197 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22197
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gwem-yat3-ebat |
|
| 6 |
| url |
VCID-k8rh-pg4b-nubu |
| vulnerability_id |
VCID-k8rh-pg4b-nubu |
| summary |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7.9 before 13.8.7, all versions starting from 13.9 before 13.9.5, and all versions starting from 13.10 before 13.10.1. A specially crafted Wiki page allowed attackers to read arbitrary files on the server. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.4732 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47272 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47308 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47329 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47275 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.4733 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47327 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47351 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47325 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47332 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.4739 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47384 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47335 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22203 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22203
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k8rh-pg4b-nubu |
|
| 7 |
| url |
VCID-ktef-sqf6-ckfp |
| vulnerability_id |
VCID-ktef-sqf6-ckfp |
| summary |
An issue has been discovered in GitLab CE/EE affecting all versions starting with 12.6. Under a special condition it was possible to access data of an internal repository through a public project fork as an anonymous user. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22200 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38554 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.3868 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38817 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38837 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38766 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38816 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38827 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38839 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38802 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38775 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.3882 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38798 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38718 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22200 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22200
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ktef-sqf6-ckfp |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-15mz-35gt-pbaq |
| vulnerability_id |
VCID-15mz-35gt-pbaq |
| summary |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 allowing unauthorized authenticated users to execute arbitrary code on the server. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22192 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.81162 |
| scoring_system |
epss |
| scoring_elements |
0.99167 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.81162 |
| scoring_system |
epss |
| scoring_elements |
0.99154 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.81162 |
| scoring_system |
epss |
| scoring_elements |
0.99155 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.81162 |
| scoring_system |
epss |
| scoring_elements |
0.99158 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.81162 |
| scoring_system |
epss |
| scoring_elements |
0.99161 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.81162 |
| scoring_system |
epss |
| scoring_elements |
0.99162 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.81162 |
| scoring_system |
epss |
| scoring_elements |
0.99163 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.81162 |
| scoring_system |
epss |
| scoring_elements |
0.99165 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22192 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22192
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-15mz-35gt-pbaq |
|
|
| Risk_score | 4.5 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.9.4-1 |