expat vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the expat package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
NULL Pointer Dereference

*
  • H
Allocation of Resources Without Limits or Throttling

<0:2.2.10-1.el8_6
  • H
Uncontrolled Recursion

<0:2.2.10-1.el8_6
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_6
  • H
XML External Entity (XXE) Injection

<0:2.2.10-1.el8_6
  • H
Allocation of Resources Without Limits or Throttling

<0:2.2.10-1.el8_6
  • H
Uncontrolled Recursion

<0:2.2.10-1.el8_6
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_6
  • H
XML External Entity (XXE) Injection

<0:2.2.10-1.el8_6
  • H
Allocation of Resources Without Limits or Throttling

<0:2.2.10-1.el8_6
  • H
Uncontrolled Recursion

<0:2.2.10-1.el8_6
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_6
  • H
XML External Entity (XXE) Injection

<0:2.2.10-1.el8_6
  • H
Allocation of Resources Without Limits or Throttling

<0:2.2.10-1.el8_2
  • H
Uncontrolled Recursion

<0:2.2.10-1.el8_2
  • H
Resource Exhaustion

<0:2.2.10-1.el8_2
  • H
Use After Free

<0:2.2.10-1.el8_2
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_2
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.10-1.el8_2
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_2
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_2
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_2
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_2
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_2
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_2
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_2
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_2
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.10-1.el8_2
  • H
Heap-based Buffer Overflow

<0:2.2.10-1.el8_2
  • H
Resource Exhaustion

<0:2.2.10-1.el8_2
  • H
XML External Entity (XXE) Injection

<0:2.2.10-1.el8_2
  • H
Allocation of Resources Without Limits or Throttling

<0:2.2.10-1.el8_4
  • H
Uncontrolled Recursion

<0:2.2.10-1.el8_4
  • H
Resource Exhaustion

<0:2.2.10-1.el8_4
  • H
Use After Free

<0:2.2.10-1.el8_4
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_4
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.10-1.el8_4
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_4
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_4
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_4
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_4
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_4
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_4
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_4
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_4
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.10-1.el8_4
  • H
XML External Entity (XXE) Injection

<0:2.2.10-1.el8_4
  • H
Allocation of Resources Without Limits or Throttling

<0:2.2.10-1.el8_8
  • H
Uncontrolled Recursion

<0:2.2.10-1.el8_8
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_8
  • H
XML External Entity (XXE) Injection

<0:2.2.10-1.el8_8
  • H
Allocation of Resources Without Limits or Throttling

<0:2.2.10-1.el8_8
  • H
Uncontrolled Recursion

<0:2.2.10-1.el8_8
  • H
Integer Overflow or Wraparound

<0:2.2.10-1.el8_8
  • H
XML External Entity (XXE) Injection

<0:2.2.10-1.el8_8
  • L
Algorithmic Complexity

*
  • H
XML External Entity (XXE) Injection

<0:2.5.0-1.el8_10
  • H
Allocation of Resources Without Limits or Throttling

<0:2.5.0-1.el8_10
  • M
Uncontrolled Recursion

<0:2.2.5-17.el8_10
  • M
Improper Check for Unusual or Exceptional Conditions

<0:2.2.5-16.el8_10
  • M
Integer Overflow or Wraparound

<0:2.2.5-15.el8_10
  • M
Integer Overflow or Wraparound

<0:2.2.5-15.el8_10
  • M
Integer Overflow or Wraparound

<0:2.2.5-15.el8_10
  • M
Resource Exhaustion

<0:2.2.5-8.el8_6.5
  • M
Resource Exhaustion

<0:2.2.5-8.el8_6.5
  • M
Resource Exhaustion

<0:2.2.5-8.el8_6.5
  • M
Resource Exhaustion

<0:2.2.5-8.el8_6.5
  • M
Resource Exhaustion

<0:2.2.5-11.el8_8.2
  • M
Resource Exhaustion

<0:2.2.5-11.el8_8.2
  • M
Resource Exhaustion

<0:2.2.5-11.el8_8.2
  • M
Resource Exhaustion

<0:2.2.5-11.el8_8.2
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.5.0-1.el8_10
  • M
Resource Exhaustion

<0:2.2.5-11.el8_9.1
  • M
Use After Free

<0:2.2.5-8.el8_6.4
  • M
Use After Free

<0:2.2.5-8.el8_6.4
  • M
Use After Free

<0:2.2.5-8.el8_6.4
  • M
Use After Free

<0:2.2.5-8.el8_6.4
  • M
Use After Free

<0:2.2.5-10.el8_7.1
  • M
Use After Free

<0:2.2.5-10.el8_7.1
  • M
Use After Free

<0:2.2.5-10.el8_7.1
  • M
Use After Free

<0:2.2.5-10.el8_7.1
  • M
Use After Free

<0:2.2.5-10.el8_7.1
  • H
Use After Free

<0:2.2.5-8.el8_6.3
  • H
Use After Free

<0:2.2.5-8.el8_6.3
  • H
Use After Free

<0:2.2.5-8.el8_6.3
  • H
Use After Free

<0:2.2.5-3.el8_2.3
  • H
Use After Free

<0:2.2.5-4.el8_4.4
  • H
Use After Free

<0:2.2.5-3.el8_2.3
  • H
Use After Free

<0:2.2.5-4.el8_4.4
  • H
Use After Free

<0:2.2.5-8.el8_6.3
  • H
Use After Free

<0:2.2.5-8.el8_6.3
  • H
Use After Free

<0:2.2.5-8.el8_6.3
  • H
Use After Free

<0:2.2.5-8.el8_6.3
  • H
Use After Free

<0:2.2.5-3.el8_2.3
  • H
Use After Free

<0:2.2.5-4.el8_4.4
  • H
Use After Free

<0:2.2.5-3.el8_1.2
  • H
Use After Free

<0:2.2.5-4.el8_4.4
  • H
Use After Free

<0:2.2.5-8.el8_6.3
  • H
Use After Free

<0:2.2.5-3.el8_2.3
  • H
Use After Free

<0:2.2.5-8.el8_6.3
  • M
Integer Overflow or Wraparound

<0:2.2.5-8.el8_6.2
  • M
Integer Overflow or Wraparound

<0:2.2.5-8.el8_6.2
  • M
Integer Overflow or Wraparound

<0:2.2.5-8.el8_6.2
  • M
Integer Overflow or Wraparound

<0:2.2.5-8.el8_6.2
  • M
Integer Overflow or Wraparound

<0:2.2.5-8.el8_6.2
  • M
Integer Overflow or Wraparound

<0:2.2.5-8.el8_6.2
  • M
Integer Overflow or Wraparound

<0:2.2.5-8.el8_6.2
  • M
Integer Overflow or Wraparound

<0:2.2.5-8.el8_6.2
  • M
Integer Overflow or Wraparound

<0:2.2.5-8.el8_6.2
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_5.3
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_5.3
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_5.3
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_4.2
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_5.3
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_5.3
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_5.3
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-3.el8_1.1
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-3.el8_2.2
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-3.el8_2.2
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-3.el8_2.2
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_4.2
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_4.2
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_4.2
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_5.3
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_5.3
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-4.el8_5.3
  • H
Incorrect Behavior Order: Early Validation

<0:2.2.5-3.el8_2.2
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.5-8.el8_6.2
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.5-8.el8_6.2
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.5-8.el8_6.2
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.5-8.el8_6.2
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.5-8.el8_6.2
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.5-8.el8_6.2
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.5-8.el8_6.2
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.5-8.el8_6.2
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:2.2.5-8.el8_6.2
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_5.3
  • H
Out-of-bounds Write

<0:2.2.5-3.el8_2.2
  • H
Out-of-bounds Write

<0:2.2.5-3.el8_1.1
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_5.3
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_5.3
  • H
Out-of-bounds Write

<0:2.2.5-3.el8_2.2
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_5.3
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_4.2
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_4.2
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_4.2
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_5.3
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_4.2
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_5.3
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_5.3
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_5.3
  • H
Out-of-bounds Write

<0:2.2.5-3.el8_2.2
  • H
Out-of-bounds Write

<0:2.2.5-3.el8_2.2
  • H
Out-of-bounds Write

<0:2.2.5-4.el8_5.3
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_4.2
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_5.3
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-3.el8_2.2
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_4.2
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-3.el8_2.2
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_5.3
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_5.3
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_5.3
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-3.el8_2.2
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_4.2
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_5.3
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_5.3
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_5.3
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-3.el8_2.2
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_5.3
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-3.el8_1.1
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_5.3
  • H
Inappropriate Encoding for Output Context

<0:2.2.5-4.el8_4.2
  • H
Integer Overflow or Wraparound

<0:2.5.0-1.el8_10
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • M
Integer Overflow or Wraparound

<0:2.2.5-4.el8_4.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • M
Integer Overflow or Wraparound

<0:2.2.5-4.el8_4.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • M
Integer Overflow or Wraparound

<0:2.2.5-4.el8_4.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • M
Integer Overflow or Wraparound

<0:2.2.5-4.el8_4.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.5-4.el8_5.3
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.5-4.el8_5.3
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.5-4.el8_5.3
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.5-4.el8_5.3
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.5-4.el8_5.3
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.5-4.el8_5.3
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.5-4.el8_5.3
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.5-4.el8_5.3
  • H
Incorrect Bitwise Shift of Integer

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • H
Integer Overflow or Wraparound

<0:2.2.5-4.el8_5.3
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Resource Exhaustion

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-4.el8