{"url":"http://public2.vulnerablecode.io/api/packages/127255?format=json","purl":"pkg:rpm/redhat/xmlsec1@1.2.6-3?arch=2","type":"rpm","namespace":"redhat","name":"xmlsec1","version":"1.2.6-3","qualifiers":{"arch":"2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33349?format=json","vulnerability_id":"VCID-12cg-us37-xbh8","summary":"This GLSA contains notification of vulnerabilities found in several\n    Gentoo packages which have been fixed prior to January 1, 2012. The worst\n    of these vulnerabilities could lead to local privilege escalation and\n    remote code execution. Please see the package list and CVE identifiers\n    below for more information.","references":[{"reference_url":"http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780","reference_id":"","reference_type":"","scores":[],"url":"http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780"},{"reference_url":"http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa","reference_id":"","reference_type":"","scores":[],"url":"http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1425.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1425","reference_id":"","reference_type":"","scores":[{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92812","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.9272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92733","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.9273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.9274","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.9275","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92749","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.9276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92764","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92771","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92776","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92789","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92801","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0931","scoring_system":"epss","scoring_elements":"0.92806","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1425"},{"reference_url":"https://bugs.webkit.org/show_bug.cgi?id=52688","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.webkit.org/show_bug.cgi?id=52688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1425"},{"reference_url":"http://secunia.com/advisories/43920","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43920"},{"reference_url":"http://secunia.com/advisories/44167","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44167"},{"reference_url":"http://secunia.com/advisories/44423","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44423"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66506","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66506"},{"reference_url":"http://trac.webkit.org/changeset/79159","reference_id":"","reference_type":"","scores":[],"url":"http://trac.webkit.org/changeset/79159"},{"reference_url":"http://www.aleksey.com/pipermail/xmlsec/2011/009120.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.aleksey.com/pipermail/xmlsec/2011/009120.html"},{"reference_url":"http://www.debian.org/security/2011/dsa-2219","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2219"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:063","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:063"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0486.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0486.html"},{"reference_url":"http://www.securityfocus.com/bid/47135","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47135"},{"reference_url":"http://www.securitytracker.com/id?1025284","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025284"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0855","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0855"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0858","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0858"},{"reference_url":"http://www.vupen.com/english/advisories/2011/1010","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/1010"},{"reference_url":"http://www.vupen.com/english/advisories/2011/1172","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/1172"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=620560","reference_id":"620560","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=620560"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=692133","reference_id":"692133","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=692133"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.2a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.2a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.2a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:0.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:0.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.0.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:aleksey:xml_security_library:1.2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:aleksey:xml_security_library:1.2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1425","reference_id":"CVE-2011-1425","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1425"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/17993.rb","reference_id":"CVE-2011-1774;OSVDB-74017;CVE-2011-1425;OSVDB-72303","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/17993.rb"},{"reference_url":"https://security.gentoo.org/glsa/201412-09","reference_id":"GLSA-201412-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0486","reference_id":"RHSA-2011:0486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0486"}],"fixed_packages":[],"aliases":["CVE-2011-1425"],"risk_score":9.2,"exploitability":"2.0","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-12cg-us37-xbh8"}],"fixing_vulnerabilities":[],"risk_score":"9.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xmlsec1@1.2.6-3%3Farch=2"}