Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/372094?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/372094?format=api", "purl": "pkg:alpm/archlinux/gitlab@13.10.3-2", "type": "alpm", "namespace": "archlinux", "name": "gitlab", "version": "13.10.3-2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "13.12.2-1", "latest_non_vulnerable_version": "15.2.1-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/240503?format=api", "vulnerability_id": "VCID-24mf-t2wp-t7cb", "summary": "An issue has been discovered in GitLab affecting all versions starting from 11.6. Pull mirror credentials are exposed that allows other maintainers to be able to view the credentials in plain-text,", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22206", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3014", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3036", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30389", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30246", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30306", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3034", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30344", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.303", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30252", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30267", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30249", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30204", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22206" }, { "reference_url": "https://security.archlinux.org/ASA-202105-4", "reference_id": "ASA-202105-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-4" }, { "reference_url": "https://security.archlinux.org/AVG-1888", "reference_id": "AVG-1888", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1888" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372095?format=api", "purl": "pkg:alpm/archlinux/gitlab@13.10.4-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-msda-xqbp-qfdd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1" } ], "aliases": [ "CVE-2021-22206" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-24mf-t2wp-t7cb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/240509?format=api", "vulnerability_id": "VCID-6tyy-j5zg-zkgw", "summary": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7. GitLab Dependency Proxy, under certain circumstances, can impersonate a user resulting in possibly incorrect access handling.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22211", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37239", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37577", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37478", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37529", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37542", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37556", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37521", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37495", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37523", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37459", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22211" }, { "reference_url": "https://security.archlinux.org/ASA-202105-4", "reference_id": "ASA-202105-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-4" }, { "reference_url": "https://security.archlinux.org/AVG-1888", "reference_id": "AVG-1888", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1888" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372095?format=api", "purl": "pkg:alpm/archlinux/gitlab@13.10.4-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-msda-xqbp-qfdd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1" } ], "aliases": [ "CVE-2021-22211" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6tyy-j5zg-zkgw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/240506?format=api", "vulnerability_id": "VCID-6yhw-9sqw-zuge", "summary": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22209", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40248", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40353", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.4044", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40466", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40389", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40441", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40473", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40416", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40464", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40432", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40357", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22209" }, { "reference_url": "https://security.archlinux.org/ASA-202105-4", "reference_id": "ASA-202105-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-4" }, { "reference_url": "https://security.archlinux.org/AVG-1888", "reference_id": "AVG-1888", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1888" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372095?format=api", "purl": "pkg:alpm/archlinux/gitlab@13.10.4-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-msda-xqbp-qfdd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1" } ], "aliases": [ "CVE-2021-22209" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6yhw-9sqw-zuge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/240508?format=api", "vulnerability_id": "VCID-n7n7-hk7v-rqa4", "summary": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2. When querying the repository branches through API, GitLab was ignoring a query parameter and returning a considerable amount of results.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22210", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34384", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34504", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34722", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34748", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34626", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34697", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.347", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34662", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34637", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34676", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34621", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22210" }, { "reference_url": "https://security.archlinux.org/ASA-202105-4", "reference_id": "ASA-202105-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-4" }, { "reference_url": "https://security.archlinux.org/AVG-1888", "reference_id": "AVG-1888", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1888" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372095?format=api", "purl": "pkg:alpm/archlinux/gitlab@13.10.4-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-msda-xqbp-qfdd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1" } ], "aliases": [ "CVE-2021-22210" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7n7-hk7v-rqa4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/240505?format=api", "vulnerability_id": "VCID-unhf-zjns-n7fn", "summary": "An issue has been discovered in GitLab affecting versions starting with 13.5 up to 13.9.7. Improper permission check could allow the change of timestamp for issue creation or update.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.39935", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.4005", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40199", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40147", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40212", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40223", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40186", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40168", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40187", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40109", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22208" }, { "reference_url": "https://security.archlinux.org/ASA-202105-4", "reference_id": "ASA-202105-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-4" }, { "reference_url": "https://security.archlinux.org/AVG-1888", "reference_id": "AVG-1888", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1888" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372095?format=api", "purl": "pkg:alpm/archlinux/gitlab@13.10.4-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-msda-xqbp-qfdd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1" } ], "aliases": [ "CVE-2021-22208" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unhf-zjns-n7fn" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.3-2" }