{"url":"http://public2.vulnerablecode.io/api/packages/586642?format=json","purl":"pkg:deb/debian/expat@2.5.0-1?distro=trixie","type":"deb","namespace":"debian","name":"expat","version":"2.5.0-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.5.0-1+deb12u1","latest_non_vulnerable_version":"2.7.5-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34205?format=json","vulnerability_id":"VCID-rjbn-1a88-87cj","summary":"A vulnerability has been found in Expat which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43680.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43680.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43680","reference_id":"","reference_type":"","scores":[{"value":"0.00557","scoring_system":"epss","scoring_elements":"0.68138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00557","scoring_system":"epss","scoring_elements":"0.68215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00557","scoring_system":"epss","scoring_elements":"0.68177","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00557","scoring_system":"epss","scoring_elements":"0.68132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00557","scoring_system":"epss","scoring_elements":"0.68155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00557","scoring_system":"epss","scoring_elements":"0.6821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00557","scoring_system":"epss","scoring_elements":"0.68224","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00557","scoring_system":"epss","scoring_elements":"0.68199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00557","scoring_system":"epss","scoring_elements":"0.68184","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43680"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022743","reference_id":"1022743","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022743"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140059","reference_id":"2140059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140059"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/28/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/28/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/01/03/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/01/03/5"},{"reference_url":"https://github.com/libexpat/libexpat/pull/616","reference_id":"616","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://github.com/libexpat/libexpat/pull/616"},{"reference_url":"https://github.com/libexpat/libexpat/issues/649","reference_id":"649","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://github.com/libexpat/libexpat/issues/649"},{"reference_url":"https://github.com/libexpat/libexpat/pull/650","reference_id":"650","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://github.com/libexpat/libexpat/pull/650"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/","reference_id":"AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/","reference_id":"BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPQVIF6TOJNY2T3ZZETFKR4G34FFREBQ/","reference_id":"DPQVIF6TOJNY2T3ZZETFKR4G34FFREBQ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPQVIF6TOJNY2T3ZZETFKR4G34FFREBQ/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5266","reference_id":"dsa-5266","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://www.debian.org/security/2022/dsa-5266"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFCOMBSOJKLIKCGCJWHLJXO4EVYBG7AR/","reference_id":"FFCOMBSOJKLIKCGCJWHLJXO4EVYBG7AR","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFCOMBSOJKLIKCGCJWHLJXO4EVYBG7AR/"},{"reference_url":"https://security.gentoo.org/glsa/202210-38","reference_id":"GLSA-202210-38","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://security.gentoo.org/glsa/202210-38"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/","reference_id":"IUJ2BULJTZ2BMSKQHB6US674P55UCWWS","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00033.html","reference_id":"msg00033.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00033.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221118-0007/","reference_id":"ntap-20221118-0007","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221118-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0103","reference_id":"RHSA-2023:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0337","reference_id":"RHSA-2023:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0421","reference_id":"RHSA-2024:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22785","reference_id":"RHSA-2025:22785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22871","reference_id":"RHSA-2025:22871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22871"},{"reference_url":"https://usn.ubuntu.com/5638-2/","reference_id":"USN-5638-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5638-2/"},{"reference_url":"https://usn.ubuntu.com/5638-3/","reference_id":"USN-5638-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5638-3/"},{"reference_url":"https://usn.ubuntu.com/5638-4/","reference_id":"USN-5638-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5638-4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5XOOB7CD55CEE6OJYKSACSIMQ4RWQ6/","reference_id":"XG5XOOB7CD55CEE6OJYKSACSIMQ4RWQ6","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:19:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5XOOB7CD55CEE6OJYKSACSIMQ4RWQ6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582483?format=json","purl":"pkg:deb/debian/expat@2.2.10-2%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1fms-7y9v-dfc5"},{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nguf-68jf-ryaz"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-qmx9-wkj4-67h3"},{"vulnerability":"VCID-u5pr-wheu-h7c6"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.2.10-2%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586642?format=json","purl":"pkg:deb/debian/expat@2.5.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582484?format=json","purl":"pkg:deb/debian/expat@2.5.0-1%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-qmx9-wkj4-67h3"},{"vulnerability":"VCID-u5pr-wheu-h7c6"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582485?format=json","purl":"pkg:deb/debian/expat@2.7.1-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-77y6-jskt-qucb"},{"vulnerability":"VCID-jqe4-44gw-wbhu"},{"vulnerability":"VCID-nktd-7gph-kkb1"},{"vulnerability":"VCID-utz3-ytaf-cbht"},{"vulnerability":"VCID-v41j-xj8s-m7ar"},{"vulnerability":"VCID-yw8s-ezc7-6ub8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.7.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582486?format=json","purl":"pkg:deb/debian/expat@2.7.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.7.5-1%3Fdistro=trixie"}],"aliases":["CVE-2022-43680"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rjbn-1a88-87cj"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/expat@2.5.0-1%3Fdistro=trixie"}