{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/256804?format=json","vulnerability_id":"VCID-71j9-ra1c-6uhm","summary":"Improper access control allows any project member to retrieve the service desk email address in GitLab CE/EE versions starting 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2.","aliases":[{"alias":"CVE-2021-39934"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371831?format=json","purl":"pkg:alpm/archlinux/gitlab@14.5.2-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/923289?format=json","purl":"pkg:deb/debian/gitlab@15.10.8%2Bds1-2?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gitlab@15.10.8%252Bds1-2%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/923255?format=json","purl":"pkg:deb/debian/gitlab@17.6.5-19?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gitlab@17.6.5-19%3Fdistro=sid"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371830?format=json","purl":"pkg:alpm/archlinux/gitlab@14.5.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17gb-vdxv-fqc4"},{"vulnerability":"VCID-1f4t-7du8-q3ex"},{"vulnerability":"VCID-5t99-3qbr-sfdj"},{"vulnerability":"VCID-6ns1-mx95-5ffe"},{"vulnerability":"VCID-71j9-ra1c-6uhm"},{"vulnerability":"VCID-989x-8yn6-eqc8"},{"vulnerability":"VCID-99uy-2jrp-u7cx"},{"vulnerability":"VCID-9mm8-knzf-a3gb"},{"vulnerability":"VCID-9wuq-32s1-nydy"},{"vulnerability":"VCID-buuk-gsy3-w7bp"},{"vulnerability":"VCID-gvwq-zqmf-ruak"},{"vulnerability":"VCID-h8td-pdxx-y7en"},{"vulnerability":"VCID-j8nr-cgq2-ubf9"},{"vulnerability":"VCID-m6c7-dfbf-r7gr"},{"vulnerability":"VCID-n2jn-c1k6-67b9"},{"vulnerability":"VCID-t8nq-hx26-kfc7"},{"vulnerability":"VCID-uzq6-eukx-8yhv"},{"vulnerability":"VCID-vfvr-mjgk-4qce"},{"vulnerability":"VCID-w1jg-8rdt-3ufv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@14.5.0-1"}],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-39934","reference_id":"","reference_type":"","scores":[{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48032","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48052","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48105","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.481","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48123","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48099","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.4811","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48163","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48158","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48112","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48093","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48049","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.47969","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48035","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48057","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48003","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-39934"},{"reference_url":"https://security.archlinux.org/ASA-202112-10","reference_id":"ASA-202112-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202112-10"},{"reference_url":"https://security.archlinux.org/AVG-2603","reference_id":"AVG-2603","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2603"}],"weaknesses":[],"exploits":[],"severity_range_score":"7.0 - 8.9","exploitability":"0.5","weighted_severity":"8.0","risk_score":4.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-71j9-ra1c-6uhm"}