Lookup for vulnerable packages by Package URL.

GET /api/packages/70054?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/70054?format=api",
    "purl": "pkg:golang/github.com/expr-lang/expr@1.17.0",
    "type": "golang",
    "namespace": "github.com/expr-lang",
    "name": "expr",
    "version": "1.17.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.17.7",
    "latest_non_vulnerable_version": "1.17.7",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/29177?format=api",
            "vulnerability_id": "VCID-chwd-qyet-4qbz",
            "summary": "Memory Exhaustion in Expr Parser with Unrestricted Input\n### Impact\nIf the Expr expression parser is given an **unbounded input string**, it will attempt to compile the *entire* string and generate an Abstract Syntax Tree (AST) node for each part of the expression. In scenarios where input size isn’t limited, a malicious or inadvertent extremely large expression can consume excessive memory as the parser builds a huge AST. This can ultimately lead to **excessive memory usage** and an **Out-Of-Memory (OOM) crash** of the process. This issue is relatively uncommon and will only manifest when there are **no restrictions on the input size**, i.e. the expression length is allowed to grow arbitrarily large. In typical use cases where inputs are bounded or validated, this problem would not occur.\n\n### Patches\n\nThe problem has been **patched** in the latest versions of the Expr library. The fix introduces compile-time limits on the number of AST nodes and memory usage during parsing, preventing any single expression from exhausting resources. Users should upgrade to **Expr version 1.17.0 or later**, as this release includes the new node budget and memory limit safeguards. Upgrading to v1.17.0 ensures that extremely deep or large expressions are detected and safely aborted during compilation, avoiding the OOM condition.\n\n### Workarounds\n\nFor users who cannot immediately upgrade, the recommended workaround is to **impose an input size restriction before parsing**. In practice, this means validating or limiting the length of expression strings that your application will accept. For example, set a maximum allowable number of characters (or nodes) for any expression and reject or truncate inputs that exceed this limit. By ensuring no unbounded-length expression is ever fed into the parser, you can prevent the parser from constructing a pathologically large AST and avoid potential memory exhaustion. In short, **pre-validate and cap input size** as a safeguard in the absence of the patch.\n\n### References\n\n- #762",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29786.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29786.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-29786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26151",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26071",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26054",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26127",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26073",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26008",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26125",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26175",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27804",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27971",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28012",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27871",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27913",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27914",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27872",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27813",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2782",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27798",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27755",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27697",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-29786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29786"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/expr-lang/expr",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/expr-lang/expr"
                },
                {
                    "reference_url": "https://github.com/expr-lang/expr/commit/0d19441454426d2f58edb22c31f3ba5f99c7a26e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-17T13:29:22Z/"
                        }
                    ],
                    "url": "https://github.com/expr-lang/expr/commit/0d19441454426d2f58edb22c31f3ba5f99c7a26e"
                },
                {
                    "reference_url": "https://github.com/expr-lang/expr/pull/762",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-17T13:29:22Z/"
                        }
                    ],
                    "url": "https://github.com/expr-lang/expr/pull/762"
                },
                {
                    "reference_url": "https://github.com/expr-lang/expr/security/advisories/GHSA-93mq-9ffx-83m2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-17T13:29:22Z/"
                        }
                    ],
                    "url": "https://github.com/expr-lang/expr/security/advisories/GHSA-93mq-9ffx-83m2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29786"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103788",
                    "reference_id": "1103788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103788"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2352914",
                    "reference_id": "2352914",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2352914"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3335",
                    "reference_id": "RHSA-2025:3335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3593",
                    "reference_id": "RHSA-2025:3593",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3593"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3740",
                    "reference_id": "RHSA-2025:3740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3743",
                    "reference_id": "RHSA-2025:3743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3743"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3993",
                    "reference_id": "RHSA-2025:3993",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3993"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7407",
                    "reference_id": "RHSA-2025:7407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7407"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7479",
                    "reference_id": "RHSA-2025:7479",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7479"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9167",
                    "reference_id": "RHSA-2025:9167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9167"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/70054?format=api",
                    "purl": "pkg:golang/github.com/expr-lang/expr@1.17.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/expr-lang/expr@1.17.0"
                }
            ],
            "aliases": [
                "CVE-2025-29786",
                "GHSA-93mq-9ffx-83m2"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-chwd-qyet-4qbz"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:golang/github.com/expr-lang/expr@1.17.0"
}