Lookup for vulnerable packages by Package URL.
| Purl | pkg:alpm/archlinux/gitlab@13.7.1-1 |
| Type | alpm |
| Namespace | archlinux |
| Name | gitlab |
| Version | 13.7.1-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 13.7.2-1 |
| Latest_non_vulnerable_version | 15.2.1-1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-5wbt-x41a-e7bs |
| vulnerability_id |
VCID-5wbt-x41a-e7bs |
| summary |
An attacker could cause a Prometheus denial of service in GitLab 13.7+ by sending an HTTP request with a malformed method |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35307 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35449 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35648 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35673 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35554 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35599 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35623 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35633 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35588 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35566 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35605 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35594 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35546 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22166 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22166
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5wbt-x41a-e7bs |
|
| 1 |
| url |
VCID-7fnb-yfbq-bfeh |
| vulnerability_id |
VCID-7fnb-yfbq-bfeh |
| summary |
A regular expression denial of service issue has been discovered in NuGet API affecting all versions of GitLab starting from version 12.8. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22168 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38122 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.3828 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38418 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38442 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38306 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38356 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38364 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38381 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38343 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38318 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38366 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38346 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38281 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22168 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22168
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7fnb-yfbq-bfeh |
|
| 2 |
| url |
VCID-b1et-bsq2-cyfn |
| vulnerability_id |
VCID-b1et-bsq2-cyfn |
| summary |
An issue has been discovered in GitLab affecting all versions starting from 12.1. Incorrect headers in specific project page allows attacker to have a temporary read access to the private repository |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48037 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.47985 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48023 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48044 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.47994 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48047 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.4804 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48065 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48041 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48053 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48105 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.481 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48056 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22167 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22167
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b1et-bsq2-cyfn |
|
| 3 |
| url |
VCID-hrbv-6bwd-a3hz |
| vulnerability_id |
VCID-hrbv-6bwd-a3hz |
| summary |
An issue has been discovered in GitLab affecting all versions starting from 12.4. The regex used for package names is written in a way that makes execution time have quadratic growth based on the length of the malicious input string. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26414 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50316 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50263 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50303 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50332 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.5028 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50326 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50355 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.5033 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50319 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50364 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50367 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50343 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26414 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-26414
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hrbv-6bwd-a3hz |
|
| 4 |
| url |
VCID-myew-c4zd-u3cw |
| vulnerability_id |
VCID-myew-c4zd-u3cw |
| summary |
Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22171 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.31821 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32127 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32167 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.3199 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32041 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.3207 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32074 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32035 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32003 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32036 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32014 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.31987 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22171 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22171
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-myew-c4zd-u3cw |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.7.1-1 |