Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1052974?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1052974?format=api", "purl": "pkg:deb/debian/xmlsec1@1.2.18-2", "type": "deb", "namespace": "debian", "name": "xmlsec1", "version": "1.2.18-2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "1.2.27-2", "latest_non_vulnerable_version": "1.2.27-2", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84477?format=api", "vulnerability_id": "VCID-k6xx-j2uv-67a9", "summary": "xmlsec1: xmlsec vulnerable to external entity expansion", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000061.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000061.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000061", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69173", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69193", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69175", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69225", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69251", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69222", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69262", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.6927", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.6925", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000061" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000061", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000061" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437311", "reference_id": "1437311", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437311" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2492", "reference_id": "RHSA-2017:2492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2492" }, { "reference_url": "https://usn.ubuntu.com/5674-1/", "reference_id": "USN-5674-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5674-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052977?format=api", "purl": "pkg:deb/debian/xmlsec1@1.2.27-2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlsec1@1.2.27-2" } ], "aliases": [ "CVE-2017-1000061" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6xx-j2uv-67a9" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33349?format=api", "vulnerability_id": "VCID-12cg-us37-xbh8", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2012. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780" }, { "reference_url": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1425.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1425.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1425", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.92764", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.9272", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.92727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.92733", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.9273", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.9274", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.92745", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.9275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.92749", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.92748", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0931", "scoring_system": "epss", "scoring_elements": "0.9276", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1425" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=52688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=52688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1425" }, { "reference_url": "http://secunia.com/advisories/43920", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43920" }, { "reference_url": "http://secunia.com/advisories/44167", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/44167" }, { "reference_url": "http://secunia.com/advisories/44423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/44423" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66506" }, { "reference_url": "http://trac.webkit.org/changeset/79159", "reference_id": "", "reference_type": "", "scores": [], "url": "http://trac.webkit.org/changeset/79159" }, { "reference_url": "http://www.aleksey.com/pipermail/xmlsec/2011/009120.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.aleksey.com/pipermail/xmlsec/2011/009120.html" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2219", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2219" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:063" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0486.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0486.html" }, { "reference_url": "http://www.securityfocus.com/bid/47135", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/47135" }, { "reference_url": "http://www.securitytracker.com/id?1025284", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1025284" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0855", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0855" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0858", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0858" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/1010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/1010" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/1172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/1172" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=620560", "reference_id": "620560", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=620560" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133", "reference_id": "692133", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.2a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.2a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.2a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:0.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.0.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:aleksey:xml_security_library:1.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1425", "reference_id": "CVE-2011-1425", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1425" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/17993.rb", "reference_id": "CVE-2011-1774;OSVDB-74017;CVE-2011-1425;OSVDB-72303", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/17993.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201412-09", "reference_id": "GLSA-201412-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0486", "reference_id": "RHSA-2011:0486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0486" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052974?format=api", "purl": "pkg:deb/debian/xmlsec1@1.2.18-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k6xx-j2uv-67a9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlsec1@1.2.18-2" } ], "aliases": [ "CVE-2011-1425" ], "risk_score": 9.2, "exploitability": "2.0", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-12cg-us37-xbh8" } ], "risk_score": "3.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlsec1@1.2.18-2" }