Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-im/pidgin@2.11.0
Typeebuild
Namespacenet-im
Namepidgin
Version2.11.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.12.0
Latest_non_vulnerable_version2.12.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7fz8-kr7a-xqfb
vulnerability_id VCID-7fz8-kr7a-xqfb
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2368
reference_id
reference_type
scores
0
value 0.06022
scoring_system epss
scoring_elements 0.90671
published_at 2026-04-01T12:55:00Z
1
value 0.06022
scoring_system epss
scoring_elements 0.90676
published_at 2026-04-02T12:55:00Z
2
value 0.06022
scoring_system epss
scoring_elements 0.90686
published_at 2026-04-04T12:55:00Z
3
value 0.06022
scoring_system epss
scoring_elements 0.90695
published_at 2026-04-07T12:55:00Z
4
value 0.06022
scoring_system epss
scoring_elements 0.90706
published_at 2026-04-08T12:55:00Z
5
value 0.06022
scoring_system epss
scoring_elements 0.90712
published_at 2026-04-09T12:55:00Z
6
value 0.06022
scoring_system epss
scoring_elements 0.90721
published_at 2026-04-12T12:55:00Z
7
value 0.06022
scoring_system epss
scoring_elements 0.90718
published_at 2026-04-13T12:55:00Z
8
value 0.06022
scoring_system epss
scoring_elements 0.90737
published_at 2026-04-16T12:55:00Z
9
value 0.06022
scoring_system epss
scoring_elements 0.90734
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348867
reference_id 1348867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348867
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2368
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fz8-kr7a-xqfb
1
url VCID-7u2r-rnyz-uyd5
vulnerability_id VCID-7u2r-rnyz-uyd5
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2375
reference_id
reference_type
scores
0
value 0.00483
scoring_system epss
scoring_elements 0.65102
published_at 2026-04-01T12:55:00Z
1
value 0.00483
scoring_system epss
scoring_elements 0.65152
published_at 2026-04-02T12:55:00Z
2
value 0.00483
scoring_system epss
scoring_elements 0.65177
published_at 2026-04-04T12:55:00Z
3
value 0.00483
scoring_system epss
scoring_elements 0.65143
published_at 2026-04-07T12:55:00Z
4
value 0.00483
scoring_system epss
scoring_elements 0.65193
published_at 2026-04-08T12:55:00Z
5
value 0.00483
scoring_system epss
scoring_elements 0.65205
published_at 2026-04-09T12:55:00Z
6
value 0.00483
scoring_system epss
scoring_elements 0.65223
published_at 2026-04-11T12:55:00Z
7
value 0.00483
scoring_system epss
scoring_elements 0.65211
published_at 2026-04-12T12:55:00Z
8
value 0.00483
scoring_system epss
scoring_elements 0.65183
published_at 2026-04-13T12:55:00Z
9
value 0.00483
scoring_system epss
scoring_elements 0.65218
published_at 2026-04-16T12:55:00Z
10
value 0.00483
scoring_system epss
scoring_elements 0.65228
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2375
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348880
reference_id 1348880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348880
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2375
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7u2r-rnyz-uyd5
2
url VCID-83az-td85-sudb
vulnerability_id VCID-83az-td85-sudb
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2380
reference_id
reference_type
scores
0
value 0.00534
scoring_system epss
scoring_elements 0.67335
published_at 2026-04-01T12:55:00Z
1
value 0.00534
scoring_system epss
scoring_elements 0.67371
published_at 2026-04-02T12:55:00Z
2
value 0.00534
scoring_system epss
scoring_elements 0.67393
published_at 2026-04-04T12:55:00Z
3
value 0.00534
scoring_system epss
scoring_elements 0.67372
published_at 2026-04-07T12:55:00Z
4
value 0.00534
scoring_system epss
scoring_elements 0.67423
published_at 2026-04-08T12:55:00Z
5
value 0.00534
scoring_system epss
scoring_elements 0.67437
published_at 2026-04-09T12:55:00Z
6
value 0.00534
scoring_system epss
scoring_elements 0.67459
published_at 2026-04-11T12:55:00Z
7
value 0.00534
scoring_system epss
scoring_elements 0.67446
published_at 2026-04-12T12:55:00Z
8
value 0.00534
scoring_system epss
scoring_elements 0.67413
published_at 2026-04-13T12:55:00Z
9
value 0.00534
scoring_system epss
scoring_elements 0.67449
published_at 2026-04-16T12:55:00Z
10
value 0.00534
scoring_system epss
scoring_elements 0.67461
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2380
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348856
reference_id 1348856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348856
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2380
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-83az-td85-sudb
3
url VCID-9btk-pnjv-1qgb
vulnerability_id VCID-9btk-pnjv-1qgb
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2367
reference_id
reference_type
scores
0
value 0.01948
scoring_system epss
scoring_elements 0.83389
published_at 2026-04-01T12:55:00Z
1
value 0.01948
scoring_system epss
scoring_elements 0.83402
published_at 2026-04-02T12:55:00Z
2
value 0.01948
scoring_system epss
scoring_elements 0.83416
published_at 2026-04-07T12:55:00Z
3
value 0.01948
scoring_system epss
scoring_elements 0.8344
published_at 2026-04-08T12:55:00Z
4
value 0.01948
scoring_system epss
scoring_elements 0.8345
published_at 2026-04-09T12:55:00Z
5
value 0.01948
scoring_system epss
scoring_elements 0.83464
published_at 2026-04-11T12:55:00Z
6
value 0.01948
scoring_system epss
scoring_elements 0.83458
published_at 2026-04-12T12:55:00Z
7
value 0.01948
scoring_system epss
scoring_elements 0.83454
published_at 2026-04-13T12:55:00Z
8
value 0.01948
scoring_system epss
scoring_elements 0.83489
published_at 2026-04-16T12:55:00Z
9
value 0.01948
scoring_system epss
scoring_elements 0.83491
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348865
reference_id 1348865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348865
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2367
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9btk-pnjv-1qgb
4
url VCID-9npz-w7g5-r3b5
vulnerability_id VCID-9npz-w7g5-r3b5
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2370
reference_id
reference_type
scores
0
value 0.01953
scoring_system epss
scoring_elements 0.83407
published_at 2026-04-01T12:55:00Z
1
value 0.01953
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-02T12:55:00Z
2
value 0.01953
scoring_system epss
scoring_elements 0.83435
published_at 2026-04-04T12:55:00Z
3
value 0.01953
scoring_system epss
scoring_elements 0.83434
published_at 2026-04-07T12:55:00Z
4
value 0.01953
scoring_system epss
scoring_elements 0.83458
published_at 2026-04-08T12:55:00Z
5
value 0.01953
scoring_system epss
scoring_elements 0.83468
published_at 2026-04-09T12:55:00Z
6
value 0.01953
scoring_system epss
scoring_elements 0.83482
published_at 2026-04-11T12:55:00Z
7
value 0.01953
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-12T12:55:00Z
8
value 0.01953
scoring_system epss
scoring_elements 0.83471
published_at 2026-04-13T12:55:00Z
9
value 0.01953
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-16T12:55:00Z
10
value 0.01953
scoring_system epss
scoring_elements 0.83509
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348871
reference_id 1348871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348871
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2370
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9npz-w7g5-r3b5
5
url VCID-ca59-9ma2-nyek
vulnerability_id VCID-ca59-9ma2-nyek
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2371
reference_id
reference_type
scores
0
value 0.03521
scoring_system epss
scoring_elements 0.8759
published_at 2026-04-01T12:55:00Z
1
value 0.03521
scoring_system epss
scoring_elements 0.876
published_at 2026-04-02T12:55:00Z
2
value 0.03521
scoring_system epss
scoring_elements 0.87613
published_at 2026-04-04T12:55:00Z
3
value 0.03521
scoring_system epss
scoring_elements 0.87616
published_at 2026-04-07T12:55:00Z
4
value 0.03521
scoring_system epss
scoring_elements 0.87636
published_at 2026-04-08T12:55:00Z
5
value 0.03521
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-09T12:55:00Z
6
value 0.03521
scoring_system epss
scoring_elements 0.87653
published_at 2026-04-11T12:55:00Z
7
value 0.03521
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-12T12:55:00Z
8
value 0.03521
scoring_system epss
scoring_elements 0.87645
published_at 2026-04-13T12:55:00Z
9
value 0.03521
scoring_system epss
scoring_elements 0.8766
published_at 2026-04-16T12:55:00Z
10
value 0.03521
scoring_system epss
scoring_elements 0.87661
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2371
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348873
reference_id 1348873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348873
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2371
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ca59-9ma2-nyek
6
url VCID-cd64-6y6b-rfa3
vulnerability_id VCID-cd64-6y6b-rfa3
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2374
reference_id
reference_type
scores
0
value 0.02781
scoring_system epss
scoring_elements 0.86001
published_at 2026-04-01T12:55:00Z
1
value 0.02781
scoring_system epss
scoring_elements 0.86012
published_at 2026-04-02T12:55:00Z
2
value 0.02781
scoring_system epss
scoring_elements 0.86029
published_at 2026-04-07T12:55:00Z
3
value 0.02781
scoring_system epss
scoring_elements 0.86048
published_at 2026-04-08T12:55:00Z
4
value 0.02781
scoring_system epss
scoring_elements 0.86058
published_at 2026-04-09T12:55:00Z
5
value 0.02781
scoring_system epss
scoring_elements 0.86072
published_at 2026-04-11T12:55:00Z
6
value 0.02781
scoring_system epss
scoring_elements 0.8607
published_at 2026-04-12T12:55:00Z
7
value 0.02781
scoring_system epss
scoring_elements 0.86065
published_at 2026-04-13T12:55:00Z
8
value 0.02781
scoring_system epss
scoring_elements 0.86082
published_at 2026-04-16T12:55:00Z
9
value 0.02781
scoring_system epss
scoring_elements 0.86088
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2374
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348878
reference_id 1348878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348878
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2374
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cd64-6y6b-rfa3
7
url VCID-kt42-hfwm-7ubh
vulnerability_id VCID-kt42-hfwm-7ubh
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2365
reference_id
reference_type
scores
0
value 0.03252
scoring_system epss
scoring_elements 0.87069
published_at 2026-04-01T12:55:00Z
1
value 0.03252
scoring_system epss
scoring_elements 0.8708
published_at 2026-04-02T12:55:00Z
2
value 0.03252
scoring_system epss
scoring_elements 0.87098
published_at 2026-04-04T12:55:00Z
3
value 0.03252
scoring_system epss
scoring_elements 0.87091
published_at 2026-04-07T12:55:00Z
4
value 0.03252
scoring_system epss
scoring_elements 0.87112
published_at 2026-04-08T12:55:00Z
5
value 0.03252
scoring_system epss
scoring_elements 0.87119
published_at 2026-04-09T12:55:00Z
6
value 0.03252
scoring_system epss
scoring_elements 0.87132
published_at 2026-04-11T12:55:00Z
7
value 0.03252
scoring_system epss
scoring_elements 0.87127
published_at 2026-04-12T12:55:00Z
8
value 0.03252
scoring_system epss
scoring_elements 0.87122
published_at 2026-04-13T12:55:00Z
9
value 0.03252
scoring_system epss
scoring_elements 0.87138
published_at 2026-04-16T12:55:00Z
10
value 0.03252
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348858
reference_id 1348858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348858
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2365
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kt42-hfwm-7ubh
8
url VCID-myh5-wcpe-zbac
vulnerability_id VCID-myh5-wcpe-zbac
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2372
reference_id
reference_type
scores
0
value 0.01217
scoring_system epss
scoring_elements 0.78988
published_at 2026-04-01T12:55:00Z
1
value 0.01217
scoring_system epss
scoring_elements 0.78994
published_at 2026-04-02T12:55:00Z
2
value 0.01217
scoring_system epss
scoring_elements 0.79021
published_at 2026-04-04T12:55:00Z
3
value 0.01217
scoring_system epss
scoring_elements 0.79005
published_at 2026-04-07T12:55:00Z
4
value 0.01217
scoring_system epss
scoring_elements 0.79029
published_at 2026-04-08T12:55:00Z
5
value 0.01217
scoring_system epss
scoring_elements 0.79036
published_at 2026-04-09T12:55:00Z
6
value 0.01217
scoring_system epss
scoring_elements 0.7906
published_at 2026-04-18T12:55:00Z
7
value 0.01217
scoring_system epss
scoring_elements 0.79045
published_at 2026-04-12T12:55:00Z
8
value 0.01217
scoring_system epss
scoring_elements 0.79035
published_at 2026-04-13T12:55:00Z
9
value 0.01217
scoring_system epss
scoring_elements 0.79063
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2372
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348876
reference_id 1348876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348876
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2372
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-myh5-wcpe-zbac
9
url VCID-nhj7-agfp-rue8
vulnerability_id VCID-nhj7-agfp-rue8
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2376
reference_id
reference_type
scores
0
value 0.06853
scoring_system epss
scoring_elements 0.91312
published_at 2026-04-01T12:55:00Z
1
value 0.06853
scoring_system epss
scoring_elements 0.91317
published_at 2026-04-02T12:55:00Z
2
value 0.06853
scoring_system epss
scoring_elements 0.91327
published_at 2026-04-04T12:55:00Z
3
value 0.06853
scoring_system epss
scoring_elements 0.91334
published_at 2026-04-07T12:55:00Z
4
value 0.06853
scoring_system epss
scoring_elements 0.91347
published_at 2026-04-08T12:55:00Z
5
value 0.06853
scoring_system epss
scoring_elements 0.91354
published_at 2026-04-09T12:55:00Z
6
value 0.06853
scoring_system epss
scoring_elements 0.9136
published_at 2026-04-11T12:55:00Z
7
value 0.06853
scoring_system epss
scoring_elements 0.91363
published_at 2026-04-13T12:55:00Z
8
value 0.06853
scoring_system epss
scoring_elements 0.91388
published_at 2026-04-16T12:55:00Z
9
value 0.06853
scoring_system epss
scoring_elements 0.91386
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2376
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348848
reference_id 1348848
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348848
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2376
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nhj7-agfp-rue8
10
url VCID-r5z8-wmea-a7by
vulnerability_id VCID-r5z8-wmea-a7by
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2378
reference_id
reference_type
scores
0
value 0.03306
scoring_system epss
scoring_elements 0.87187
published_at 2026-04-01T12:55:00Z
1
value 0.03306
scoring_system epss
scoring_elements 0.87197
published_at 2026-04-02T12:55:00Z
2
value 0.03306
scoring_system epss
scoring_elements 0.87214
published_at 2026-04-04T12:55:00Z
3
value 0.03306
scoring_system epss
scoring_elements 0.87211
published_at 2026-04-07T12:55:00Z
4
value 0.03306
scoring_system epss
scoring_elements 0.87231
published_at 2026-04-08T12:55:00Z
5
value 0.03306
scoring_system epss
scoring_elements 0.87238
published_at 2026-04-09T12:55:00Z
6
value 0.03306
scoring_system epss
scoring_elements 0.87251
published_at 2026-04-11T12:55:00Z
7
value 0.03306
scoring_system epss
scoring_elements 0.87245
published_at 2026-04-12T12:55:00Z
8
value 0.03306
scoring_system epss
scoring_elements 0.8724
published_at 2026-04-13T12:55:00Z
9
value 0.03306
scoring_system epss
scoring_elements 0.87255
published_at 2026-04-16T12:55:00Z
10
value 0.03306
scoring_system epss
scoring_elements 0.8726
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348854
reference_id 1348854
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348854
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2378
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r5z8-wmea-a7by
11
url VCID-tqpn-6ttw-9ffc
vulnerability_id VCID-tqpn-6ttw-9ffc
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2379.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2379
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.3655
published_at 2026-04-01T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36634
published_at 2026-04-18T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36607
published_at 2026-04-13T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36652
published_at 2026-04-16T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36721
published_at 2026-04-02T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36753
published_at 2026-04-04T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36589
published_at 2026-04-07T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36642
published_at 2026-04-08T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36659
published_at 2026-04-09T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36667
published_at 2026-04-11T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.36632
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2379
2
reference_url https://pidgin.im/news/security/?id=95
reference_id
reference_type
scores
url https://pidgin.im/news/security/?id=95
3
reference_url http://www.securityfocus.com/bid/91335
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91335
4
reference_url http://www.talosintelligence.com/reports/TALOS-2016-0122/
reference_id
reference_type
scores
url http://www.talosintelligence.com/reports/TALOS-2016-0122/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1363715
reference_id 1363715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1363715
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:mxit:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:mxit:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:mxit:-:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2379
reference_id CVE-2016-2379
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:P/I:N/A:N
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2379
8
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2379
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqpn-6ttw-9ffc
12
url VCID-uf3q-52zp-p3bk
vulnerability_id VCID-uf3q-52zp-p3bk
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2377
reference_id
reference_type
scores
0
value 0.03306
scoring_system epss
scoring_elements 0.87187
published_at 2026-04-01T12:55:00Z
1
value 0.03306
scoring_system epss
scoring_elements 0.87197
published_at 2026-04-02T12:55:00Z
2
value 0.03306
scoring_system epss
scoring_elements 0.87214
published_at 2026-04-04T12:55:00Z
3
value 0.03306
scoring_system epss
scoring_elements 0.87211
published_at 2026-04-07T12:55:00Z
4
value 0.03306
scoring_system epss
scoring_elements 0.87231
published_at 2026-04-08T12:55:00Z
5
value 0.03306
scoring_system epss
scoring_elements 0.87238
published_at 2026-04-09T12:55:00Z
6
value 0.03306
scoring_system epss
scoring_elements 0.87251
published_at 2026-04-11T12:55:00Z
7
value 0.03306
scoring_system epss
scoring_elements 0.87245
published_at 2026-04-12T12:55:00Z
8
value 0.03306
scoring_system epss
scoring_elements 0.8724
published_at 2026-04-13T12:55:00Z
9
value 0.03306
scoring_system epss
scoring_elements 0.87255
published_at 2026-04-16T12:55:00Z
10
value 0.03306
scoring_system epss
scoring_elements 0.8726
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348852
reference_id 1348852
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348852
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2377
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uf3q-52zp-p3bk
13
url VCID-vczt-sf85-uyfc
vulnerability_id VCID-vczt-sf85-uyfc
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1000030
reference_id
reference_type
scores
0
value 0.00738
scoring_system epss
scoring_elements 0.729
published_at 2026-04-18T12:55:00Z
1
value 0.00738
scoring_system epss
scoring_elements 0.72792
published_at 2026-04-01T12:55:00Z
2
value 0.00738
scoring_system epss
scoring_elements 0.72799
published_at 2026-04-02T12:55:00Z
3
value 0.00738
scoring_system epss
scoring_elements 0.72819
published_at 2026-04-04T12:55:00Z
4
value 0.00738
scoring_system epss
scoring_elements 0.72795
published_at 2026-04-07T12:55:00Z
5
value 0.00738
scoring_system epss
scoring_elements 0.72834
published_at 2026-04-08T12:55:00Z
6
value 0.00738
scoring_system epss
scoring_elements 0.72848
published_at 2026-04-13T12:55:00Z
7
value 0.00738
scoring_system epss
scoring_elements 0.72872
published_at 2026-04-11T12:55:00Z
8
value 0.00738
scoring_system epss
scoring_elements 0.72855
published_at 2026-04-12T12:55:00Z
9
value 0.00738
scoring_system epss
scoring_elements 0.7289
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1000030
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348882
reference_id 1348882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348882
5
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-1000030
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vczt-sf85-uyfc
14
url VCID-vmjg-nj4a-8uby
vulnerability_id VCID-vmjg-nj4a-8uby
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4323
reference_id
reference_type
scores
0
value 0.01998
scoring_system epss
scoring_elements 0.83581
published_at 2026-04-01T12:55:00Z
1
value 0.01998
scoring_system epss
scoring_elements 0.83594
published_at 2026-04-02T12:55:00Z
2
value 0.01998
scoring_system epss
scoring_elements 0.83608
published_at 2026-04-04T12:55:00Z
3
value 0.01998
scoring_system epss
scoring_elements 0.8361
published_at 2026-04-07T12:55:00Z
4
value 0.01998
scoring_system epss
scoring_elements 0.83634
published_at 2026-04-08T12:55:00Z
5
value 0.01998
scoring_system epss
scoring_elements 0.83642
published_at 2026-04-09T12:55:00Z
6
value 0.01998
scoring_system epss
scoring_elements 0.83658
published_at 2026-04-11T12:55:00Z
7
value 0.01998
scoring_system epss
scoring_elements 0.83652
published_at 2026-04-12T12:55:00Z
8
value 0.01998
scoring_system epss
scoring_elements 0.83647
published_at 2026-04-13T12:55:00Z
9
value 0.01998
scoring_system epss
scoring_elements 0.83682
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4323
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348857
reference_id 1348857
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348857
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-4323
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vmjg-nj4a-8uby
15
url VCID-xgfd-ykfk-33dh
vulnerability_id VCID-xgfd-ykfk-33dh
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2373
reference_id
reference_type
scores
0
value 0.01953
scoring_system epss
scoring_elements 0.83407
published_at 2026-04-01T12:55:00Z
1
value 0.01953
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-02T12:55:00Z
2
value 0.01953
scoring_system epss
scoring_elements 0.83435
published_at 2026-04-04T12:55:00Z
3
value 0.01953
scoring_system epss
scoring_elements 0.83434
published_at 2026-04-07T12:55:00Z
4
value 0.01953
scoring_system epss
scoring_elements 0.83458
published_at 2026-04-08T12:55:00Z
5
value 0.01953
scoring_system epss
scoring_elements 0.83468
published_at 2026-04-09T12:55:00Z
6
value 0.01953
scoring_system epss
scoring_elements 0.83482
published_at 2026-04-11T12:55:00Z
7
value 0.01953
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-12T12:55:00Z
8
value 0.01953
scoring_system epss
scoring_elements 0.83471
published_at 2026-04-13T12:55:00Z
9
value 0.01953
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-16T12:55:00Z
10
value 0.01953
scoring_system epss
scoring_elements 0.83509
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348877
reference_id 1348877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348877
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2373
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xgfd-ykfk-33dh
16
url VCID-ym5e-f9a1-ufdz
vulnerability_id VCID-ym5e-f9a1-ufdz
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2369
reference_id
reference_type
scores
0
value 0.03252
scoring_system epss
scoring_elements 0.87069
published_at 2026-04-01T12:55:00Z
1
value 0.03252
scoring_system epss
scoring_elements 0.8708
published_at 2026-04-02T12:55:00Z
2
value 0.03252
scoring_system epss
scoring_elements 0.87098
published_at 2026-04-04T12:55:00Z
3
value 0.03252
scoring_system epss
scoring_elements 0.87091
published_at 2026-04-07T12:55:00Z
4
value 0.03252
scoring_system epss
scoring_elements 0.87112
published_at 2026-04-08T12:55:00Z
5
value 0.03252
scoring_system epss
scoring_elements 0.87119
published_at 2026-04-09T12:55:00Z
6
value 0.03252
scoring_system epss
scoring_elements 0.87132
published_at 2026-04-11T12:55:00Z
7
value 0.03252
scoring_system epss
scoring_elements 0.87127
published_at 2026-04-12T12:55:00Z
8
value 0.03252
scoring_system epss
scoring_elements 0.87122
published_at 2026-04-13T12:55:00Z
9
value 0.03252
scoring_system epss
scoring_elements 0.87138
published_at 2026-04-16T12:55:00Z
10
value 0.03252
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2369
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348869
reference_id 1348869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348869
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2369
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ym5e-f9a1-ufdz
17
url VCID-zamj-2ej2-qke5
vulnerability_id VCID-zamj-2ej2-qke5
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2366
reference_id
reference_type
scores
0
value 0.01953
scoring_system epss
scoring_elements 0.83407
published_at 2026-04-01T12:55:00Z
1
value 0.01953
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-02T12:55:00Z
2
value 0.01953
scoring_system epss
scoring_elements 0.83435
published_at 2026-04-04T12:55:00Z
3
value 0.01953
scoring_system epss
scoring_elements 0.83434
published_at 2026-04-07T12:55:00Z
4
value 0.01953
scoring_system epss
scoring_elements 0.83458
published_at 2026-04-08T12:55:00Z
5
value 0.01953
scoring_system epss
scoring_elements 0.83468
published_at 2026-04-09T12:55:00Z
6
value 0.01953
scoring_system epss
scoring_elements 0.83482
published_at 2026-04-11T12:55:00Z
7
value 0.01953
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-12T12:55:00Z
8
value 0.01953
scoring_system epss
scoring_elements 0.83471
published_at 2026-04-13T12:55:00Z
9
value 0.01953
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-16T12:55:00Z
10
value 0.01953
scoring_system epss
scoring_elements 0.83509
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348862
reference_id 1348862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348862
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:ebuild/net-im/pidgin@2.11.0
purl pkg:ebuild/net-im/pidgin@2.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0
aliases CVE-2016-2366
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zamj-2ej2-qke5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0