Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-pwfc-n1q7-b7e4
SummaryRedmine 4.2.0 and 4.2.1 allow existing user sessions to continue upon enabling two-factor authentication for the user's account, but the intended behavior is for those sessions to be terminated.
Aliases
0
alias CVE-2021-37156
Fixed_packages
0
url pkg:alpm/archlinux/redmine@4.2.2-1
purl pkg:alpm/archlinux/redmine@4.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/redmine@4.2.2-1
1
url pkg:deb/debian/redmine@0?distro=trixie
purl pkg:deb/debian/redmine@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/redmine@0%3Fdistro=trixie
2
url pkg:deb/debian/redmine@5.0.4-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/redmine@5.0.4-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/redmine@5.0.4-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/redmine@6.0.5%2Bds-1?distro=trixie
purl pkg:deb/debian/redmine@6.0.5%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/redmine@6.0.5%252Bds-1%3Fdistro=trixie
4
url pkg:deb/debian/redmine@6.0.6%2Bds-6?distro=trixie
purl pkg:deb/debian/redmine@6.0.6%2Bds-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/redmine@6.0.6%252Bds-6%3Fdistro=trixie
Affected_packages
0
url pkg:alpm/archlinux/redmine@4.2.1-1
purl pkg:alpm/archlinux/redmine@4.2.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gjey-bqtd-kqa1
1
vulnerability VCID-pwfc-n1q7-b7e4
2
vulnerability VCID-wg3a-j2dp-ayh4
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/redmine@4.2.1-1
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37156
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.4806
published_at 2026-04-21T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.47989
published_at 2026-04-01T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48027
published_at 2026-04-02T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48048
published_at 2026-04-04T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.47998
published_at 2026-04-07T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48051
published_at 2026-04-08T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.48044
published_at 2026-04-09T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48069
published_at 2026-04-11T12:55:00Z
8
value 0.00248
scoring_system epss
scoring_elements 0.48045
published_at 2026-04-12T12:55:00Z
9
value 0.00248
scoring_system epss
scoring_elements 0.48057
published_at 2026-04-13T12:55:00Z
10
value 0.00248
scoring_system epss
scoring_elements 0.48109
published_at 2026-04-16T12:55:00Z
11
value 0.00248
scoring_system epss
scoring_elements 0.48104
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37156
1
reference_url https://security.archlinux.org/AVG-1920
reference_id AVG-1920
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1920
Weaknesses
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-pwfc-n1q7-b7e4