Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/gitlab@14.5.2-1
Typealpm
Namespacearchlinux
Namegitlab
Version14.5.2-1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version14.10.2-1
Latest_non_vulnerable_version15.2.1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1f4t-7du8-q3ex
vulnerability_id VCID-1f4t-7du8-q3ex
summary A vulnerable regular expression pattern in GitLab CE/EE since version 8.15 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to cause uncontrolled resource consumption leading to Denial of Service via specially crafted deploy Slash commands
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39938
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33441
published_at 2026-04-24T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33591
published_at 2026-04-01T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33923
published_at 2026-04-02T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33954
published_at 2026-04-04T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33808
published_at 2026-04-07T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.3385
published_at 2026-04-08T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33882
published_at 2026-04-09T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33881
published_at 2026-04-11T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33839
published_at 2026-04-18T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33814
published_at 2026-04-13T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33853
published_at 2026-04-16T12:55:00Z
11
value 0.00138
scoring_system epss
scoring_elements 0.33807
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39938
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39938
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1f4t-7du8-q3ex
1
url VCID-5t99-3qbr-sfdj
vulnerability_id VCID-5t99-3qbr-sfdj
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression used for handling user input (notes, comments, etc) was susceptible to catastrophic backtracking that could cause a DOS attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39933
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.4058
published_at 2026-04-24T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.4068
published_at 2026-04-01T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40764
published_at 2026-04-02T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40791
published_at 2026-04-11T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40715
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40765
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40772
published_at 2026-04-09T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40757
published_at 2026-04-12T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40738
published_at 2026-04-13T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40783
published_at 2026-04-16T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40753
published_at 2026-04-18T12:55:00Z
11
value 0.00189
scoring_system epss
scoring_elements 0.40675
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39933
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39933
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5t99-3qbr-sfdj
2
url VCID-6ns1-mx95-5ffe
vulnerability_id VCID-6ns1-mx95-5ffe
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab Maven Package registry is vulnerable to a regular expression denial of service when a specifically crafted string is sent.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39940
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.4058
published_at 2026-04-24T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.4068
published_at 2026-04-01T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40764
published_at 2026-04-02T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40791
published_at 2026-04-11T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40715
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40765
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40772
published_at 2026-04-09T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40757
published_at 2026-04-12T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40738
published_at 2026-04-13T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40783
published_at 2026-04-16T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40753
published_at 2026-04-18T12:55:00Z
11
value 0.00189
scoring_system epss
scoring_elements 0.40675
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39940
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39940
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ns1-mx95-5ffe
3
url VCID-71j9-ra1c-6uhm
vulnerability_id VCID-71j9-ra1c-6uhm
summary Improper access control allows any project member to retrieve the service desk email address in GitLab CE/EE versions starting 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39934
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48093
published_at 2026-04-24T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.48044
published_at 2026-04-01T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48081
published_at 2026-04-02T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48102
published_at 2026-04-04T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.48052
published_at 2026-04-07T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48105
published_at 2026-04-08T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.481
published_at 2026-04-09T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48123
published_at 2026-04-11T12:55:00Z
8
value 0.00248
scoring_system epss
scoring_elements 0.48099
published_at 2026-04-12T12:55:00Z
9
value 0.00248
scoring_system epss
scoring_elements 0.4811
published_at 2026-04-13T12:55:00Z
10
value 0.00248
scoring_system epss
scoring_elements 0.48163
published_at 2026-04-16T12:55:00Z
11
value 0.00248
scoring_system epss
scoring_elements 0.48158
published_at 2026-04-18T12:55:00Z
12
value 0.00248
scoring_system epss
scoring_elements 0.48112
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39934
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39934
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71j9-ra1c-6uhm
4
url VCID-989x-8yn6-eqc8
vulnerability_id VCID-989x-8yn6-eqc8
summary A collision in access memoization logic in all versions of GitLab CE/EE before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, leads to potential elevated privileges in groups and projects under rare circumstances
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39937
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35371
published_at 2026-04-24T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35511
published_at 2026-04-01T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35713
published_at 2026-04-02T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35738
published_at 2026-04-04T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35619
published_at 2026-04-07T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35665
published_at 2026-04-08T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35688
published_at 2026-04-09T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35698
published_at 2026-04-11T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35653
published_at 2026-04-12T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35631
published_at 2026-04-13T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.3567
published_at 2026-04-16T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35661
published_at 2026-04-18T12:55:00Z
12
value 0.00151
scoring_system epss
scoring_elements 0.35609
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39937
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39937
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-989x-8yn6-eqc8
5
url VCID-99uy-2jrp-u7cx
vulnerability_id VCID-99uy-2jrp-u7cx
summary Improper access control in GitLab CE/EE affecting all versions starting from 10.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker in possession of a deploy token to access a project's disabled wiki.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39936
reference_id
reference_type
scores
0
value 0.00342
scoring_system epss
scoring_elements 0.56857
published_at 2026-04-24T12:55:00Z
1
value 0.00342
scoring_system epss
scoring_elements 0.56802
published_at 2026-04-01T12:55:00Z
2
value 0.00342
scoring_system epss
scoring_elements 0.56896
published_at 2026-04-02T12:55:00Z
3
value 0.00342
scoring_system epss
scoring_elements 0.56918
published_at 2026-04-04T12:55:00Z
4
value 0.00342
scoring_system epss
scoring_elements 0.56894
published_at 2026-04-07T12:55:00Z
5
value 0.00342
scoring_system epss
scoring_elements 0.56946
published_at 2026-04-08T12:55:00Z
6
value 0.00342
scoring_system epss
scoring_elements 0.56949
published_at 2026-04-09T12:55:00Z
7
value 0.00342
scoring_system epss
scoring_elements 0.56957
published_at 2026-04-11T12:55:00Z
8
value 0.00342
scoring_system epss
scoring_elements 0.56937
published_at 2026-04-12T12:55:00Z
9
value 0.00342
scoring_system epss
scoring_elements 0.56914
published_at 2026-04-13T12:55:00Z
10
value 0.00342
scoring_system epss
scoring_elements 0.56943
published_at 2026-04-16T12:55:00Z
11
value 0.00342
scoring_system epss
scoring_elements 0.5694
published_at 2026-04-18T12:55:00Z
12
value 0.00342
scoring_system epss
scoring_elements 0.56917
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39936
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39936
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-99uy-2jrp-u7cx
6
url VCID-9mm8-knzf-a3gb
vulnerability_id VCID-9mm8-knzf-a3gb
summary Improper access control in the GitLab CE/EE API affecting all versions starting from 9.4 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an author of a Merge Request to approve the Merge Request even after having their project access revoked
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39945
reference_id
reference_type
scores
0
value 0.00244
scoring_system epss
scoring_elements 0.47679
published_at 2026-04-24T12:55:00Z
1
value 0.00244
scoring_system epss
scoring_elements 0.47628
published_at 2026-04-01T12:55:00Z
2
value 0.00244
scoring_system epss
scoring_elements 0.47666
published_at 2026-04-02T12:55:00Z
3
value 0.00244
scoring_system epss
scoring_elements 0.47687
published_at 2026-04-09T12:55:00Z
4
value 0.00244
scoring_system epss
scoring_elements 0.47636
published_at 2026-04-07T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.47691
published_at 2026-04-08T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47711
published_at 2026-04-11T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.47688
published_at 2026-04-12T12:55:00Z
8
value 0.00244
scoring_system epss
scoring_elements 0.47697
published_at 2026-04-13T12:55:00Z
9
value 0.00244
scoring_system epss
scoring_elements 0.47753
published_at 2026-04-16T12:55:00Z
10
value 0.00244
scoring_system epss
scoring_elements 0.47746
published_at 2026-04-18T12:55:00Z
11
value 0.00244
scoring_system epss
scoring_elements 0.47698
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39945
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39945
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mm8-knzf-a3gb
7
url VCID-9wuq-32s1-nydy
vulnerability_id VCID-9wuq-32s1-nydy
summary Improper access control in the GraphQL API in GitLab CE/EE affecting all versions starting from 13.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to see the names of project access tokens on arbitrary projects
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39915
reference_id
reference_type
scores
0
value 0.00269
scoring_system epss
scoring_elements 0.50394
published_at 2026-04-24T12:55:00Z
1
value 0.00269
scoring_system epss
scoring_elements 0.50338
published_at 2026-04-01T12:55:00Z
2
value 0.00269
scoring_system epss
scoring_elements 0.50393
published_at 2026-04-02T12:55:00Z
3
value 0.00269
scoring_system epss
scoring_elements 0.50423
published_at 2026-04-04T12:55:00Z
4
value 0.00269
scoring_system epss
scoring_elements 0.50375
published_at 2026-04-07T12:55:00Z
5
value 0.00269
scoring_system epss
scoring_elements 0.50429
published_at 2026-04-08T12:55:00Z
6
value 0.00269
scoring_system epss
scoring_elements 0.50422
published_at 2026-04-09T12:55:00Z
7
value 0.00269
scoring_system epss
scoring_elements 0.50463
published_at 2026-04-11T12:55:00Z
8
value 0.00269
scoring_system epss
scoring_elements 0.5044
published_at 2026-04-12T12:55:00Z
9
value 0.00269
scoring_system epss
scoring_elements 0.50425
published_at 2026-04-13T12:55:00Z
10
value 0.00269
scoring_system epss
scoring_elements 0.50468
published_at 2026-04-16T12:55:00Z
11
value 0.00269
scoring_system epss
scoring_elements 0.50472
published_at 2026-04-18T12:55:00Z
12
value 0.00269
scoring_system epss
scoring_elements 0.50449
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39915
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39915
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9wuq-32s1-nydy
8
url VCID-buuk-gsy3-w7bp
vulnerability_id VCID-buuk-gsy3-w7bp
summary In all versions of GitLab CE/EE starting version 14.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, the reset password token and new user email token are accidentally logged which may lead to information disclosure.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39919
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20681
published_at 2026-04-24T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-08T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21004
published_at 2026-04-02T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.2106
published_at 2026-04-04T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20774
published_at 2026-04-07T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20915
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20931
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20887
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20836
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20826
published_at 2026-04-16T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20818
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.208
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39919
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39919
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-buuk-gsy3-w7bp
9
url VCID-gvwq-zqmf-ruak
vulnerability_id VCID-gvwq-zqmf-ruak
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab was vulnerable to HTML Injection through the Swagger UI feature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39910
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39343
published_at 2026-04-24T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.3947
published_at 2026-04-01T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.3962
published_at 2026-04-02T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39642
published_at 2026-04-04T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39559
published_at 2026-04-07T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39613
published_at 2026-04-08T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39628
published_at 2026-04-09T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39638
published_at 2026-04-11T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39601
published_at 2026-04-12T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39585
published_at 2026-04-13T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39636
published_at 2026-04-16T12:55:00Z
11
value 0.0018
scoring_system epss
scoring_elements 0.39606
published_at 2026-04-18T12:55:00Z
12
value 0.0018
scoring_system epss
scoring_elements 0.39523
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39910
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39910
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gvwq-zqmf-ruak
10
url VCID-h8td-pdxx-y7en
vulnerability_id VCID-h8td-pdxx-y7en
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.9 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression related to quick actions features was susceptible to catastrophic backtracking that could cause a DOS attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39917
reference_id
reference_type
scores
0
value 0.00386
scoring_system epss
scoring_elements 0.59803
published_at 2026-04-24T12:55:00Z
1
value 0.00386
scoring_system epss
scoring_elements 0.59687
published_at 2026-04-01T12:55:00Z
2
value 0.00386
scoring_system epss
scoring_elements 0.5976
published_at 2026-04-02T12:55:00Z
3
value 0.00386
scoring_system epss
scoring_elements 0.59784
published_at 2026-04-04T12:55:00Z
4
value 0.00386
scoring_system epss
scoring_elements 0.59753
published_at 2026-04-07T12:55:00Z
5
value 0.00386
scoring_system epss
scoring_elements 0.59805
published_at 2026-04-08T12:55:00Z
6
value 0.00386
scoring_system epss
scoring_elements 0.59818
published_at 2026-04-09T12:55:00Z
7
value 0.00386
scoring_system epss
scoring_elements 0.59838
published_at 2026-04-11T12:55:00Z
8
value 0.00386
scoring_system epss
scoring_elements 0.59822
published_at 2026-04-12T12:55:00Z
9
value 0.00386
scoring_system epss
scoring_elements 0.59804
published_at 2026-04-13T12:55:00Z
10
value 0.00386
scoring_system epss
scoring_elements 0.59841
published_at 2026-04-16T12:55:00Z
11
value 0.00386
scoring_system epss
scoring_elements 0.59848
published_at 2026-04-18T12:55:00Z
12
value 0.00386
scoring_system epss
scoring_elements 0.59832
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39917
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39917
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h8td-pdxx-y7en
11
url VCID-m6c7-dfbf-r7gr
vulnerability_id VCID-m6c7-dfbf-r7gr
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.11 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Under specific condition an unauthorised project member was allowed to delete a protected branches due to a business logic error.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39931
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.48608
published_at 2026-04-21T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.48538
published_at 2026-04-01T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.48574
published_at 2026-04-02T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48597
published_at 2026-04-04T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.48549
published_at 2026-04-07T12:55:00Z
5
value 0.00253
scoring_system epss
scoring_elements 0.48603
published_at 2026-04-08T12:55:00Z
6
value 0.00253
scoring_system epss
scoring_elements 0.48599
published_at 2026-04-09T12:55:00Z
7
value 0.00253
scoring_system epss
scoring_elements 0.4862
published_at 2026-04-11T12:55:00Z
8
value 0.00253
scoring_system epss
scoring_elements 0.48593
published_at 2026-04-24T12:55:00Z
9
value 0.00253
scoring_system epss
scoring_elements 0.48606
published_at 2026-04-13T12:55:00Z
10
value 0.00253
scoring_system epss
scoring_elements 0.48656
published_at 2026-04-16T12:55:00Z
11
value 0.00253
scoring_system epss
scoring_elements 0.48651
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39931
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39931
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m6c7-dfbf-r7gr
12
url VCID-t8nq-hx26-kfc7
vulnerability_id VCID-t8nq-hx26-kfc7
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39935
reference_id
reference_type
scores
0
value 0.41434
scoring_system epss
scoring_elements 0.97378
published_at 2026-04-01T12:55:00Z
1
value 0.41434
scoring_system epss
scoring_elements 0.97389
published_at 2026-04-04T12:55:00Z
2
value 0.41434
scoring_system epss
scoring_elements 0.97391
published_at 2026-04-07T12:55:00Z
3
value 0.41434
scoring_system epss
scoring_elements 0.97397
published_at 2026-04-08T12:55:00Z
4
value 0.41434
scoring_system epss
scoring_elements 0.97398
published_at 2026-04-09T12:55:00Z
5
value 0.41434
scoring_system epss
scoring_elements 0.974
published_at 2026-04-11T12:55:00Z
6
value 0.41434
scoring_system epss
scoring_elements 0.97401
published_at 2026-04-12T12:55:00Z
7
value 0.41434
scoring_system epss
scoring_elements 0.97402
published_at 2026-04-13T12:55:00Z
8
value 0.41434
scoring_system epss
scoring_elements 0.9741
published_at 2026-04-16T12:55:00Z
9
value 0.41434
scoring_system epss
scoring_elements 0.97413
published_at 2026-04-18T12:55:00Z
10
value 0.41434
scoring_system epss
scoring_elements 0.97384
published_at 2026-04-02T12:55:00Z
11
value 0.58412
scoring_system epss
scoring_elements 0.98206
published_at 2026-04-21T12:55:00Z
12
value 0.58412
scoring_system epss
scoring_elements 0.98208
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39935
1
reference_url https://hackerone.com/reports/1236965
reference_id 1236965
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-03T15:23:46Z/
url https://hackerone.com/reports/1236965
2
reference_url https://gitlab.com/gitlab-org/gitlab/-/issues/346187
reference_id 346187
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-03T15:23:46Z/
url https://gitlab.com/gitlab-org/gitlab/-/issues/346187
3
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
4
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
5
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39935.json
reference_id CVE-2021-39935.json
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-03T15:23:46Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39935.json
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39935
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t8nq-hx26-kfc7
13
url VCID-uzq6-eukx-8yhv
vulnerability_id VCID-uzq6-eukx-8yhv
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A permissions validation flaw allowed group members with a developer role to elevate their privilege to a maintainer on projects they import
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39944
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38836
published_at 2026-04-24T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.38955
published_at 2026-04-01T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39141
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39163
published_at 2026-04-04T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39082
published_at 2026-04-07T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39137
published_at 2026-04-08T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39153
published_at 2026-04-09T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39165
published_at 2026-04-11T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39128
published_at 2026-04-12T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-13T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39164
published_at 2026-04-16T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.39133
published_at 2026-04-18T12:55:00Z
12
value 0.00176
scoring_system epss
scoring_elements 0.39045
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39944
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39944
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzq6-eukx-8yhv
14
url VCID-vfvr-mjgk-4qce
vulnerability_id VCID-vfvr-mjgk-4qce
summary An information disclosure vulnerability in GitLab CE/EE versions 12.0 to 14.3.6, 14.4 to 14.4.4, and 14.5 to 14.5.2 allowed non-project members to see the default branch name for projects that restrict access to the repository to project members
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39941
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52606
published_at 2026-04-24T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52522
published_at 2026-04-01T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52568
published_at 2026-04-02T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52594
published_at 2026-04-04T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52561
published_at 2026-04-07T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52613
published_at 2026-04-08T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52607
published_at 2026-04-09T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52658
published_at 2026-04-11T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52641
published_at 2026-04-12T12:55:00Z
9
value 0.00293
scoring_system epss
scoring_elements 0.52625
published_at 2026-04-13T12:55:00Z
10
value 0.00293
scoring_system epss
scoring_elements 0.52663
published_at 2026-04-16T12:55:00Z
11
value 0.00293
scoring_system epss
scoring_elements 0.5267
published_at 2026-04-18T12:55:00Z
12
value 0.00293
scoring_system epss
scoring_elements 0.52655
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39941
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39941
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfvr-mjgk-4qce
15
url VCID-w1jg-8rdt-3ufv
vulnerability_id VCID-w1jg-8rdt-3ufv
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Using large payloads, the diff feature could be used to trigger high load time for users reviewing code changes.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39932
reference_id
reference_type
scores
0
value 0.00222
scoring_system epss
scoring_elements 0.4469
published_at 2026-04-24T12:55:00Z
1
value 0.00222
scoring_system epss
scoring_elements 0.44711
published_at 2026-04-01T12:55:00Z
2
value 0.00222
scoring_system epss
scoring_elements 0.44791
published_at 2026-04-02T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44812
published_at 2026-04-04T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.44752
published_at 2026-04-07T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44805
published_at 2026-04-08T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.44807
published_at 2026-04-09T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44824
published_at 2026-04-11T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44793
published_at 2026-04-12T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44794
published_at 2026-04-13T12:55:00Z
10
value 0.00222
scoring_system epss
scoring_elements 0.44848
published_at 2026-04-16T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44841
published_at 2026-04-18T12:55:00Z
12
value 0.00222
scoring_system epss
scoring_elements 0.44776
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39932
1
reference_url https://security.archlinux.org/ASA-202112-10
reference_id ASA-202112-10
reference_type
scores
url https://security.archlinux.org/ASA-202112-10
2
reference_url https://security.archlinux.org/AVG-2603
reference_id AVG-2603
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2603
fixed_packages
0
url pkg:alpm/archlinux/gitlab@14.5.2-1
purl pkg:alpm/archlinux/gitlab@14.5.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1
aliases CVE-2021-39932
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w1jg-8rdt-3ufv
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1