Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/pidgin@2.14.12-1?distro=trixie
Typedeb
Namespacedebian
Namepidgin
Version2.14.12-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.14.14-1
Latest_non_vulnerable_version2.14.14-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-13y4-t2b9-pkg9
vulnerability_id VCID-13y4-t2b9-pkg9
summary pidgin: SILC remote crash on channel messages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4603.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4603
reference_id
reference_type
scores
0
value 0.01165
scoring_system epss
scoring_elements 0.78575
published_at 2026-04-01T12:55:00Z
1
value 0.01165
scoring_system epss
scoring_elements 0.78582
published_at 2026-04-02T12:55:00Z
2
value 0.01165
scoring_system epss
scoring_elements 0.78614
published_at 2026-04-04T12:55:00Z
3
value 0.01165
scoring_system epss
scoring_elements 0.78596
published_at 2026-04-07T12:55:00Z
4
value 0.01165
scoring_system epss
scoring_elements 0.78621
published_at 2026-04-08T12:55:00Z
5
value 0.01165
scoring_system epss
scoring_elements 0.78627
published_at 2026-04-09T12:55:00Z
6
value 0.01165
scoring_system epss
scoring_elements 0.78652
published_at 2026-04-11T12:55:00Z
7
value 0.01165
scoring_system epss
scoring_elements 0.78633
published_at 2026-04-12T12:55:00Z
8
value 0.01165
scoring_system epss
scoring_elements 0.78626
published_at 2026-04-13T12:55:00Z
9
value 0.01165
scoring_system epss
scoring_elements 0.78655
published_at 2026-04-16T12:55:00Z
10
value 0.01165
scoring_system epss
scoring_elements 0.78653
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4603
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=766446
reference_id 766446
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=766446
4
reference_url https://access.redhat.com/errata/RHSA-2011:1820
reference_id RHSA-2011:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1820
5
reference_url https://usn.ubuntu.com/1500-1/
reference_id USN-1500-1
reference_type
scores
url https://usn.ubuntu.com/1500-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2011-4603
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13y4-t2b9-pkg9
1
url VCID-1fmj-vjdg-g3eu
vulnerability_id VCID-1fmj-vjdg-g3eu
summary pidgin: Multiple NULL pointer deference flaws by processing certain Jingle stanzas in the XMPP protocol plug-in
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4602.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4602
reference_id
reference_type
scores
0
value 0.01535
scoring_system epss
scoring_elements 0.81272
published_at 2026-04-01T12:55:00Z
1
value 0.01535
scoring_system epss
scoring_elements 0.81281
published_at 2026-04-02T12:55:00Z
2
value 0.01535
scoring_system epss
scoring_elements 0.81303
published_at 2026-04-04T12:55:00Z
3
value 0.01535
scoring_system epss
scoring_elements 0.81301
published_at 2026-04-07T12:55:00Z
4
value 0.01535
scoring_system epss
scoring_elements 0.8133
published_at 2026-04-08T12:55:00Z
5
value 0.01535
scoring_system epss
scoring_elements 0.81335
published_at 2026-04-09T12:55:00Z
6
value 0.01535
scoring_system epss
scoring_elements 0.81356
published_at 2026-04-11T12:55:00Z
7
value 0.01535
scoring_system epss
scoring_elements 0.81341
published_at 2026-04-12T12:55:00Z
8
value 0.01535
scoring_system epss
scoring_elements 0.81333
published_at 2026-04-13T12:55:00Z
9
value 0.01535
scoring_system epss
scoring_elements 0.81371
published_at 2026-04-16T12:55:00Z
10
value 0.01535
scoring_system epss
scoring_elements 0.81373
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4602
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=761510
reference_id 761510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=761510
4
reference_url https://access.redhat.com/errata/RHSA-2011:1820
reference_id RHSA-2011:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1820
5
reference_url https://access.redhat.com/errata/RHSA-2011:1821
reference_id RHSA-2011:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1821
6
reference_url https://usn.ubuntu.com/1500-1/
reference_id USN-1500-1
reference_type
scores
url https://usn.ubuntu.com/1500-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2011-4602
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1fmj-vjdg-g3eu
2
url VCID-1p3d-b4v1-6fdg
vulnerability_id VCID-1p3d-b4v1-6fdg
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6477.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6477.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6477
reference_id
reference_type
scores
0
value 0.01006
scoring_system epss
scoring_elements 0.76987
published_at 2026-04-01T12:55:00Z
1
value 0.01006
scoring_system epss
scoring_elements 0.76992
published_at 2026-04-02T12:55:00Z
2
value 0.01006
scoring_system epss
scoring_elements 0.77021
published_at 2026-04-04T12:55:00Z
3
value 0.01006
scoring_system epss
scoring_elements 0.77002
published_at 2026-04-07T12:55:00Z
4
value 0.01006
scoring_system epss
scoring_elements 0.77034
published_at 2026-04-08T12:55:00Z
5
value 0.01006
scoring_system epss
scoring_elements 0.77045
published_at 2026-04-09T12:55:00Z
6
value 0.01006
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-11T12:55:00Z
7
value 0.01006
scoring_system epss
scoring_elements 0.77052
published_at 2026-04-12T12:55:00Z
8
value 0.01006
scoring_system epss
scoring_elements 0.77047
published_at 2026-04-13T12:55:00Z
9
value 0.01006
scoring_system epss
scoring_elements 0.77088
published_at 2026-04-16T12:55:00Z
10
value 0.01006
scoring_system epss
scoring_elements 0.77089
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6477
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1056479
reference_id 1056479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1056479
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6477
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1p3d-b4v1-6fdg
3
url VCID-1x1f-8ujk-53fw
vulnerability_id VCID-1x1f-8ujk-53fw
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6484.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6484
reference_id
reference_type
scores
0
value 0.00683
scoring_system epss
scoring_elements 0.71584
published_at 2026-04-01T12:55:00Z
1
value 0.00683
scoring_system epss
scoring_elements 0.71591
published_at 2026-04-02T12:55:00Z
2
value 0.00683
scoring_system epss
scoring_elements 0.71609
published_at 2026-04-04T12:55:00Z
3
value 0.00683
scoring_system epss
scoring_elements 0.71582
published_at 2026-04-07T12:55:00Z
4
value 0.00683
scoring_system epss
scoring_elements 0.71622
published_at 2026-04-08T12:55:00Z
5
value 0.00683
scoring_system epss
scoring_elements 0.71632
published_at 2026-04-09T12:55:00Z
6
value 0.00683
scoring_system epss
scoring_elements 0.71656
published_at 2026-04-11T12:55:00Z
7
value 0.00683
scoring_system epss
scoring_elements 0.7164
published_at 2026-04-12T12:55:00Z
8
value 0.00683
scoring_system epss
scoring_elements 0.71621
published_at 2026-04-13T12:55:00Z
9
value 0.00683
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-16T12:55:00Z
10
value 0.00683
scoring_system epss
scoring_elements 0.7167
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6484
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1057481
reference_id 1057481
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1057481
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6484
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1x1f-8ujk-53fw
4
url VCID-25qc-25g9-cbhn
vulnerability_id VCID-25qc-25g9-cbhn
summary (libpurple): Multiple DoS (crash) flaws by processing of unsanitized Base64 decoder values
references
0
reference_url http://developer.pidgin.im/viewmtn/revision/info/b01c6a1f7fe4d86b83f5f10917b3cb713989cfcc
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/info/b01c6a1f7fe4d86b83f5f10917b3cb713989cfcc
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050227.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050227.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050695.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050695.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050133.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050133.html
4
reference_url http://pidgin.im/news/security/?id=48
reference_id
reference_type
scores
url http://pidgin.im/news/security/?id=48
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3711.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3711.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3711
reference_id
reference_type
scores
0
value 0.01058
scoring_system epss
scoring_elements 0.77553
published_at 2026-04-01T12:55:00Z
1
value 0.01058
scoring_system epss
scoring_elements 0.77585
published_at 2026-04-04T12:55:00Z
2
value 0.01058
scoring_system epss
scoring_elements 0.77566
published_at 2026-04-07T12:55:00Z
3
value 0.01058
scoring_system epss
scoring_elements 0.77596
published_at 2026-04-08T12:55:00Z
4
value 0.01058
scoring_system epss
scoring_elements 0.77603
published_at 2026-04-09T12:55:00Z
5
value 0.01058
scoring_system epss
scoring_elements 0.7763
published_at 2026-04-11T12:55:00Z
6
value 0.01058
scoring_system epss
scoring_elements 0.77559
published_at 2026-04-02T12:55:00Z
7
value 0.01385
scoring_system epss
scoring_elements 0.80342
published_at 2026-04-16T12:55:00Z
8
value 0.01385
scoring_system epss
scoring_elements 0.80344
published_at 2026-04-18T12:55:00Z
9
value 0.01385
scoring_system epss
scoring_elements 0.80318
published_at 2026-04-12T12:55:00Z
10
value 0.01385
scoring_system epss
scoring_elements 0.80312
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3711
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711
8
reference_url http://secunia.com/advisories/41893
reference_id
reference_type
scores
url http://secunia.com/advisories/41893
9
reference_url http://secunia.com/advisories/41899
reference_id
reference_type
scores
url http://secunia.com/advisories/41899
10
reference_url http://secunia.com/advisories/42075
reference_id
reference_type
scores
url http://secunia.com/advisories/42075
11
reference_url http://secunia.com/advisories/42294
reference_id
reference_type
scores
url http://secunia.com/advisories/42294
12
reference_url http://securitytracker.com/id?1024623
reference_id
reference_type
scores
url http://securitytracker.com/id?1024623
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/62708
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/62708
14
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462352
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462352
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18506
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18506
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:208
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:208
17
reference_url http://www.osvdb.org/68773
reference_id
reference_type
scores
url http://www.osvdb.org/68773
18
reference_url http://www.redhat.com/support/errata/RHSA-2010-0788.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0788.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2010-0890.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0890.html
20
reference_url http://www.securityfocus.com/bid/44283
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44283
21
reference_url http://www.ubuntu.com/usn/USN-1014-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1014-1
22
reference_url http://www.vupen.com/english/advisories/2010/2753
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2753
23
reference_url http://www.vupen.com/english/advisories/2010/2754
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2754
24
reference_url http://www.vupen.com/english/advisories/2010/2755
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2755
25
reference_url http://www.vupen.com/english/advisories/2010/2847
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2847
26
reference_url http://www.vupen.com/english/advisories/2010/2851
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2851
27
reference_url http://www.vupen.com/english/advisories/2010/2870
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2870
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=641921
reference_id 641921
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=641921
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3711
reference_id CVE-2010-3711
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3711
64
reference_url https://access.redhat.com/errata/RHSA-2010:0788
reference_id RHSA-2010:0788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0788
65
reference_url https://access.redhat.com/errata/RHSA-2010:0890
reference_id RHSA-2010:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0890
66
reference_url https://usn.ubuntu.com/1014-1/
reference_id USN-1014-1
reference_type
scores
url https://usn.ubuntu.com/1014-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.7.4-1?distro=trixie
purl pkg:deb/debian/pidgin@2.7.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.4-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2010-3711
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-25qc-25g9-cbhn
5
url VCID-28mm-t6zv-b3fx
vulnerability_id VCID-28mm-t6zv-b3fx
summary Pidgin: Invalid pointer dereference (crash) after receiving contacts from SIM IM client
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3615.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3615
reference_id
reference_type
scores
0
value 0.07985
scoring_system epss
scoring_elements 0.9205
published_at 2026-04-01T12:55:00Z
1
value 0.07985
scoring_system epss
scoring_elements 0.92056
published_at 2026-04-02T12:55:00Z
2
value 0.07985
scoring_system epss
scoring_elements 0.92064
published_at 2026-04-04T12:55:00Z
3
value 0.07985
scoring_system epss
scoring_elements 0.92069
published_at 2026-04-07T12:55:00Z
4
value 0.07985
scoring_system epss
scoring_elements 0.92081
published_at 2026-04-08T12:55:00Z
5
value 0.07985
scoring_system epss
scoring_elements 0.92084
published_at 2026-04-09T12:55:00Z
6
value 0.07985
scoring_system epss
scoring_elements 0.92088
published_at 2026-04-12T12:55:00Z
7
value 0.08411
scoring_system epss
scoring_elements 0.92331
published_at 2026-04-13T12:55:00Z
8
value 0.08411
scoring_system epss
scoring_elements 0.92343
published_at 2026-04-16T12:55:00Z
9
value 0.08411
scoring_system epss
scoring_elements 0.92342
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3615
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=529357
reference_id 529357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=529357
4
reference_url https://access.redhat.com/errata/RHSA-2009:1535
reference_id RHSA-2009:1535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1535
5
reference_url https://access.redhat.com/errata/RHSA-2009:1536
reference_id RHSA-2009:1536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1536
6
reference_url https://usn.ubuntu.com/886-1/
reference_id USN-886-1
reference_type
scores
url https://usn.ubuntu.com/886-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.3-1?distro=trixie
purl pkg:deb/debian/pidgin@2.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.3-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-3615
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28mm-t6zv-b3fx
6
url VCID-2v38-xu17-5ycr
vulnerability_id VCID-2v38-xu17-5ycr
summary
Multiple vulnerabilities were found in Pidgin, the worst of which
    allowing for the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0013.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0013.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0013
reference_id
reference_type
scores
0
value 0.12845
scoring_system epss
scoring_elements 0.94002
published_at 2026-04-01T12:55:00Z
1
value 0.12845
scoring_system epss
scoring_elements 0.94012
published_at 2026-04-02T12:55:00Z
2
value 0.12845
scoring_system epss
scoring_elements 0.94021
published_at 2026-04-04T12:55:00Z
3
value 0.12845
scoring_system epss
scoring_elements 0.94024
published_at 2026-04-07T12:55:00Z
4
value 0.12845
scoring_system epss
scoring_elements 0.94032
published_at 2026-04-08T12:55:00Z
5
value 0.12845
scoring_system epss
scoring_elements 0.94036
published_at 2026-04-09T12:55:00Z
6
value 0.12845
scoring_system epss
scoring_elements 0.94041
published_at 2026-04-11T12:55:00Z
7
value 0.12845
scoring_system epss
scoring_elements 0.9404
published_at 2026-04-13T12:55:00Z
8
value 0.12845
scoring_system epss
scoring_elements 0.94056
published_at 2026-04-16T12:55:00Z
9
value 0.12845
scoring_system epss
scoring_elements 0.94061
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0013
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=552483
reference_id 552483
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=552483
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=563206
reference_id 563206
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=563206
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/11203.py
reference_id CVE-2010-0013;OSVDB-61420
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/11203.py
6
reference_url https://security.gentoo.org/glsa/201206-11
reference_id GLSA-201206-11
reference_type
scores
url https://security.gentoo.org/glsa/201206-11
7
reference_url https://access.redhat.com/errata/RHSA-2010:0044
reference_id RHSA-2010:0044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0044
8
reference_url https://usn.ubuntu.com/886-1/
reference_id USN-886-1
reference_type
scores
url https://usn.ubuntu.com/886-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.5-1?distro=trixie
purl pkg:deb/debian/pidgin@2.6.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.5-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2010-0013
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2v38-xu17-5ycr
7
url VCID-3m4a-pw2r-zkfb
vulnerability_id VCID-3m4a-pw2r-zkfb
summary
Multiple vulnerabilities were found in Pidgin, the worst of which
    allowing for the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3594.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3594
reference_id
reference_type
scores
0
value 0.00959
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-01T12:55:00Z
1
value 0.00959
scoring_system epss
scoring_elements 0.76409
published_at 2026-04-02T12:55:00Z
2
value 0.00959
scoring_system epss
scoring_elements 0.76437
published_at 2026-04-04T12:55:00Z
3
value 0.00959
scoring_system epss
scoring_elements 0.76419
published_at 2026-04-07T12:55:00Z
4
value 0.00959
scoring_system epss
scoring_elements 0.76451
published_at 2026-04-08T12:55:00Z
5
value 0.00959
scoring_system epss
scoring_elements 0.76465
published_at 2026-04-09T12:55:00Z
6
value 0.00959
scoring_system epss
scoring_elements 0.76491
published_at 2026-04-11T12:55:00Z
7
value 0.00959
scoring_system epss
scoring_elements 0.76469
published_at 2026-04-12T12:55:00Z
8
value 0.00959
scoring_system epss
scoring_elements 0.76464
published_at 2026-04-13T12:55:00Z
9
value 0.00959
scoring_system epss
scoring_elements 0.76505
published_at 2026-04-16T12:55:00Z
10
value 0.00959
scoring_system epss
scoring_elements 0.76509
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=743481
reference_id 743481
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=743481
4
reference_url https://security.gentoo.org/glsa/201206-11
reference_id GLSA-201206-11
reference_type
scores
url https://security.gentoo.org/glsa/201206-11
5
reference_url https://access.redhat.com/errata/RHSA-2011:1371
reference_id RHSA-2011:1371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1371
6
reference_url https://usn.ubuntu.com/1273-1/
reference_id USN-1273-1
reference_type
scores
url https://usn.ubuntu.com/1273-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2011-3594
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3m4a-pw2r-zkfb
8
url VCID-3zuy-sufn-tfcw
vulnerability_id VCID-3zuy-sufn-tfcw
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6487.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6487.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6487
reference_id
reference_type
scores
0
value 0.03908
scoring_system epss
scoring_elements 0.88236
published_at 2026-04-01T12:55:00Z
1
value 0.03908
scoring_system epss
scoring_elements 0.88244
published_at 2026-04-02T12:55:00Z
2
value 0.03908
scoring_system epss
scoring_elements 0.88259
published_at 2026-04-04T12:55:00Z
3
value 0.03908
scoring_system epss
scoring_elements 0.88263
published_at 2026-04-07T12:55:00Z
4
value 0.03908
scoring_system epss
scoring_elements 0.88283
published_at 2026-04-08T12:55:00Z
5
value 0.03908
scoring_system epss
scoring_elements 0.88289
published_at 2026-04-09T12:55:00Z
6
value 0.03908
scoring_system epss
scoring_elements 0.88301
published_at 2026-04-11T12:55:00Z
7
value 0.03908
scoring_system epss
scoring_elements 0.88293
published_at 2026-04-13T12:55:00Z
8
value 0.03908
scoring_system epss
scoring_elements 0.88306
published_at 2026-04-16T12:55:00Z
9
value 0.03908
scoring_system epss
scoring_elements 0.88304
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6487
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1057489
reference_id 1057489
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1057489
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://security.gentoo.org/glsa/201508-02
reference_id GLSA-201508-02
reference_type
scores
url https://security.gentoo.org/glsa/201508-02
17
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
18
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
19
reference_url https://usn.ubuntu.com/2101-1/
reference_id USN-2101-1
reference_type
scores
url https://usn.ubuntu.com/2101-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6487
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3zuy-sufn-tfcw
9
url VCID-562h-uev3-nqby
vulnerability_id VCID-562h-uev3-nqby
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6482.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6482.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6482
reference_id
reference_type
scores
0
value 0.00743
scoring_system epss
scoring_elements 0.72956
published_at 2026-04-01T12:55:00Z
1
value 0.00743
scoring_system epss
scoring_elements 0.72969
published_at 2026-04-02T12:55:00Z
2
value 0.00743
scoring_system epss
scoring_elements 0.72989
published_at 2026-04-04T12:55:00Z
3
value 0.00743
scoring_system epss
scoring_elements 0.72965
published_at 2026-04-07T12:55:00Z
4
value 0.00743
scoring_system epss
scoring_elements 0.73002
published_at 2026-04-08T12:55:00Z
5
value 0.00743
scoring_system epss
scoring_elements 0.73016
published_at 2026-04-09T12:55:00Z
6
value 0.00743
scoring_system epss
scoring_elements 0.73041
published_at 2026-04-11T12:55:00Z
7
value 0.00743
scoring_system epss
scoring_elements 0.7302
published_at 2026-04-12T12:55:00Z
8
value 0.00743
scoring_system epss
scoring_elements 0.73013
published_at 2026-04-13T12:55:00Z
9
value 0.00743
scoring_system epss
scoring_elements 0.73055
published_at 2026-04-16T12:55:00Z
10
value 0.00743
scoring_system epss
scoring_elements 0.73065
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6482
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1056913
reference_id 1056913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1056913
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6482
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-562h-uev3-nqby
10
url VCID-59qb-mtwz-puda
vulnerability_id VCID-59qb-mtwz-puda
summary pidgin: Smiley Denial of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0423.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0423
reference_id
reference_type
scores
0
value 0.08804
scoring_system epss
scoring_elements 0.92488
published_at 2026-04-01T12:55:00Z
1
value 0.08804
scoring_system epss
scoring_elements 0.92493
published_at 2026-04-02T12:55:00Z
2
value 0.08804
scoring_system epss
scoring_elements 0.92502
published_at 2026-04-04T12:55:00Z
3
value 0.08804
scoring_system epss
scoring_elements 0.92504
published_at 2026-04-07T12:55:00Z
4
value 0.08804
scoring_system epss
scoring_elements 0.92516
published_at 2026-04-08T12:55:00Z
5
value 0.08804
scoring_system epss
scoring_elements 0.92521
published_at 2026-04-09T12:55:00Z
6
value 0.08804
scoring_system epss
scoring_elements 0.92527
published_at 2026-04-13T12:55:00Z
7
value 0.08804
scoring_system epss
scoring_elements 0.92528
published_at 2026-04-12T12:55:00Z
8
value 0.08804
scoring_system epss
scoring_elements 0.92538
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=565792
reference_id 565792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=565792
4
reference_url https://access.redhat.com/errata/RHSA-2010:0115
reference_id RHSA-2010:0115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0115
5
reference_url https://usn.ubuntu.com/902-1/
reference_id USN-902-1
reference_type
scores
url https://usn.ubuntu.com/902-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.6-1?distro=trixie
purl pkg:deb/debian/pidgin@2.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2010-0423
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-59qb-mtwz-puda
11
url VCID-5bxz-xddd-rudq
vulnerability_id VCID-5bxz-xddd-rudq
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6152.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6152.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6152
reference_id
reference_type
scores
0
value 0.01147
scoring_system epss
scoring_elements 0.78495
published_at 2026-04-18T12:55:00Z
1
value 0.01147
scoring_system epss
scoring_elements 0.78415
published_at 2026-04-01T12:55:00Z
2
value 0.01147
scoring_system epss
scoring_elements 0.78421
published_at 2026-04-02T12:55:00Z
3
value 0.01147
scoring_system epss
scoring_elements 0.78452
published_at 2026-04-04T12:55:00Z
4
value 0.01147
scoring_system epss
scoring_elements 0.78437
published_at 2026-04-07T12:55:00Z
5
value 0.01147
scoring_system epss
scoring_elements 0.78463
published_at 2026-04-08T12:55:00Z
6
value 0.01147
scoring_system epss
scoring_elements 0.78468
published_at 2026-04-09T12:55:00Z
7
value 0.01147
scoring_system epss
scoring_elements 0.78493
published_at 2026-04-11T12:55:00Z
8
value 0.01147
scoring_system epss
scoring_elements 0.78474
published_at 2026-04-12T12:55:00Z
9
value 0.01147
scoring_system epss
scoring_elements 0.78467
published_at 2026-04-13T12:55:00Z
10
value 0.01147
scoring_system epss
scoring_elements 0.78496
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6152
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1056473
reference_id 1056473
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1056473
5
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
6
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
7
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2012-6152
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5bxz-xddd-rudq
12
url VCID-5k78-mks2-ckdk
vulnerability_id VCID-5k78-mks2-ckdk
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6483.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6483.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6483
reference_id
reference_type
scores
0
value 0.00863
scoring_system epss
scoring_elements 0.75031
published_at 2026-04-01T12:55:00Z
1
value 0.00863
scoring_system epss
scoring_elements 0.75034
published_at 2026-04-02T12:55:00Z
2
value 0.00863
scoring_system epss
scoring_elements 0.75063
published_at 2026-04-04T12:55:00Z
3
value 0.00863
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-07T12:55:00Z
4
value 0.00863
scoring_system epss
scoring_elements 0.75073
published_at 2026-04-08T12:55:00Z
5
value 0.00863
scoring_system epss
scoring_elements 0.75085
published_at 2026-04-09T12:55:00Z
6
value 0.00863
scoring_system epss
scoring_elements 0.75108
published_at 2026-04-11T12:55:00Z
7
value 0.00863
scoring_system epss
scoring_elements 0.75086
published_at 2026-04-12T12:55:00Z
8
value 0.00863
scoring_system epss
scoring_elements 0.75075
published_at 2026-04-13T12:55:00Z
9
value 0.00863
scoring_system epss
scoring_elements 0.75113
published_at 2026-04-16T12:55:00Z
10
value 0.00863
scoring_system epss
scoring_elements 0.7512
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6483
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1056978
reference_id 1056978
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1056978
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6483
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5k78-mks2-ckdk
13
url VCID-5ktd-d1vb-xqhb
vulnerability_id VCID-5ktd-d1vb-xqhb
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url http://hg.pidgin.im/pidgin/main/rev/c31cf8de31cd
reference_id
reference_type
scores
url http://hg.pidgin.im/pidgin/main/rev/c31cf8de31cd
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0273.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0273.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0273
reference_id
reference_type
scores
0
value 0.02107
scoring_system epss
scoring_elements 0.84122
published_at 2026-04-18T12:55:00Z
1
value 0.02107
scoring_system epss
scoring_elements 0.84029
published_at 2026-04-01T12:55:00Z
2
value 0.02107
scoring_system epss
scoring_elements 0.84044
published_at 2026-04-02T12:55:00Z
3
value 0.02107
scoring_system epss
scoring_elements 0.8406
published_at 2026-04-04T12:55:00Z
4
value 0.02107
scoring_system epss
scoring_elements 0.84062
published_at 2026-04-07T12:55:00Z
5
value 0.02107
scoring_system epss
scoring_elements 0.84085
published_at 2026-04-08T12:55:00Z
6
value 0.02107
scoring_system epss
scoring_elements 0.84092
published_at 2026-04-09T12:55:00Z
7
value 0.02107
scoring_system epss
scoring_elements 0.84109
published_at 2026-04-11T12:55:00Z
8
value 0.02107
scoring_system epss
scoring_elements 0.84103
published_at 2026-04-12T12:55:00Z
9
value 0.02107
scoring_system epss
scoring_elements 0.84099
published_at 2026-04-13T12:55:00Z
10
value 0.02107
scoring_system epss
scoring_elements 0.8412
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0273
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18340
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18340
8
reference_url http://www.pidgin.im/news/security/?id=67
reference_id
reference_type
scores
url http://www.pidgin.im/news/security/?id=67
9
reference_url http://www.ubuntu.com/usn/USN-1746-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1746-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=910041
reference_id 910041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=910041
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0273
reference_id CVE-2013-0273
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0273
63
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
64
reference_url https://access.redhat.com/errata/RHSA-2013:0646
reference_id RHSA-2013:0646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0646
65
reference_url https://usn.ubuntu.com/1746-1/
reference_id USN-1746-1
reference_type
scores
url https://usn.ubuntu.com/1746-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.6-3?distro=trixie
purl pkg:deb/debian/pidgin@2.10.6-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-0273
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ktd-d1vb-xqhb
14
url VCID-5us8-sghn-zyf1
vulnerability_id VCID-5us8-sghn-zyf1
summary security update
references
0
reference_url http://hg.pidgin.im/pidgin/main/rev/44fd89158777
reference_id
reference_type
scores
url http://hg.pidgin.im/pidgin/main/rev/44fd89158777
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
3
reference_url http://pidgin.im/news/security/?id=88
reference_id
reference_type
scores
url http://pidgin.im/news/security/?id=88
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3696.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3696.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3696
reference_id
reference_type
scores
0
value 0.02136
scoring_system epss
scoring_elements 0.84123
published_at 2026-04-01T12:55:00Z
1
value 0.02136
scoring_system epss
scoring_elements 0.84136
published_at 2026-04-02T12:55:00Z
2
value 0.02136
scoring_system epss
scoring_elements 0.84154
published_at 2026-04-04T12:55:00Z
3
value 0.02136
scoring_system epss
scoring_elements 0.84156
published_at 2026-04-07T12:55:00Z
4
value 0.02136
scoring_system epss
scoring_elements 0.84178
published_at 2026-04-08T12:55:00Z
5
value 0.02136
scoring_system epss
scoring_elements 0.84184
published_at 2026-04-09T12:55:00Z
6
value 0.02136
scoring_system epss
scoring_elements 0.84202
published_at 2026-04-11T12:55:00Z
7
value 0.02136
scoring_system epss
scoring_elements 0.84197
published_at 2026-04-12T12:55:00Z
8
value 0.02136
scoring_system epss
scoring_elements 0.84193
published_at 2026-04-13T12:55:00Z
9
value 0.02136
scoring_system epss
scoring_elements 0.84215
published_at 2026-04-16T12:55:00Z
10
value 0.02136
scoring_system epss
scoring_elements 0.84216
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3696
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
10
reference_url http://secunia.com/advisories/60741
reference_id
reference_type
scores
url http://secunia.com/advisories/60741
11
reference_url http://secunia.com/advisories/61968
reference_id
reference_type
scores
url http://secunia.com/advisories/61968
12
reference_url http://www.debian.org/security/2014/dsa-3055
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3055
13
reference_url http://www.ubuntu.com/usn/USN-2390-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2390-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1154910
reference_id 1154910
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1154910
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3696
reference_id CVE-2014-3696
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3696
26
reference_url https://access.redhat.com/errata/RHSA-2017:1854
reference_id RHSA-2017:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1854
27
reference_url https://usn.ubuntu.com/2390-1/
reference_id USN-2390-1
reference_type
scores
url https://usn.ubuntu.com/2390-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.10-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2014-3696
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5us8-sghn-zyf1
15
url VCID-6gvz-3ye8-zyen
vulnerability_id VCID-6gvz-3ye8-zyen
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0020.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0020.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0020
reference_id
reference_type
scores
0
value 0.03531
scoring_system epss
scoring_elements 0.87607
published_at 2026-04-01T12:55:00Z
1
value 0.03531
scoring_system epss
scoring_elements 0.87616
published_at 2026-04-02T12:55:00Z
2
value 0.03531
scoring_system epss
scoring_elements 0.8763
published_at 2026-04-04T12:55:00Z
3
value 0.03531
scoring_system epss
scoring_elements 0.87632
published_at 2026-04-07T12:55:00Z
4
value 0.03531
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-08T12:55:00Z
5
value 0.03531
scoring_system epss
scoring_elements 0.87658
published_at 2026-04-09T12:55:00Z
6
value 0.03531
scoring_system epss
scoring_elements 0.87669
published_at 2026-04-11T12:55:00Z
7
value 0.03531
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-12T12:55:00Z
8
value 0.03531
scoring_system epss
scoring_elements 0.87661
published_at 2026-04-13T12:55:00Z
9
value 0.03531
scoring_system epss
scoring_elements 0.87676
published_at 2026-04-16T12:55:00Z
10
value 0.03531
scoring_system epss
scoring_elements 0.87677
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0020
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1057502
reference_id 1057502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1057502
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2014-0020
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gvz-3ye8-zyen
16
url VCID-6jkc-nx2t-7fgd
vulnerability_id VCID-6jkc-nx2t-7fgd
summary Pidgin: NULL pointer dereference by handling IRC topic(s) (DoS)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2703.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2703.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2703
reference_id
reference_type
scores
0
value 0.00643
scoring_system epss
scoring_elements 0.70565
published_at 2026-04-01T12:55:00Z
1
value 0.00643
scoring_system epss
scoring_elements 0.70579
published_at 2026-04-02T12:55:00Z
2
value 0.00643
scoring_system epss
scoring_elements 0.70595
published_at 2026-04-04T12:55:00Z
3
value 0.00643
scoring_system epss
scoring_elements 0.70573
published_at 2026-04-07T12:55:00Z
4
value 0.00643
scoring_system epss
scoring_elements 0.70619
published_at 2026-04-08T12:55:00Z
5
value 0.00643
scoring_system epss
scoring_elements 0.70635
published_at 2026-04-09T12:55:00Z
6
value 0.00643
scoring_system epss
scoring_elements 0.70657
published_at 2026-04-11T12:55:00Z
7
value 0.00643
scoring_system epss
scoring_elements 0.70643
published_at 2026-04-12T12:55:00Z
8
value 0.00643
scoring_system epss
scoring_elements 0.70628
published_at 2026-04-13T12:55:00Z
9
value 0.00643
scoring_system epss
scoring_elements 0.70673
published_at 2026-04-16T12:55:00Z
10
value 0.00643
scoring_system epss
scoring_elements 0.70682
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2703
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2703
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521823
reference_id 521823
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521823
4
reference_url https://access.redhat.com/errata/RHSA-2009:1453
reference_id RHSA-2009:1453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1453
5
reference_url https://access.redhat.com/errata/RHSA-2009:1535
reference_id RHSA-2009:1535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1535
6
reference_url https://usn.ubuntu.com/886-1/
reference_id USN-886-1
reference_type
scores
url https://usn.ubuntu.com/886-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.2?distro=trixie
purl pkg:deb/debian/pidgin@2.6.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-2703
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jkc-nx2t-7fgd
17
url VCID-6utr-f9hr-wkhd
vulnerability_id VCID-6utr-f9hr-wkhd
summary security update
references
0
reference_url http://hg.pidgin.im/pidgin/main/rev/6436e14bdb9d
reference_id
reference_type
scores
url http://hg.pidgin.im/pidgin/main/rev/6436e14bdb9d
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
3
reference_url http://pidgin.im/news/security/?id=87
reference_id
reference_type
scores
url http://pidgin.im/news/security/?id=87
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3695.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3695.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3695
reference_id
reference_type
scores
0
value 0.02136
scoring_system epss
scoring_elements 0.84123
published_at 2026-04-01T12:55:00Z
1
value 0.02136
scoring_system epss
scoring_elements 0.84136
published_at 2026-04-02T12:55:00Z
2
value 0.02136
scoring_system epss
scoring_elements 0.84154
published_at 2026-04-04T12:55:00Z
3
value 0.02136
scoring_system epss
scoring_elements 0.84156
published_at 2026-04-07T12:55:00Z
4
value 0.02136
scoring_system epss
scoring_elements 0.84178
published_at 2026-04-08T12:55:00Z
5
value 0.02136
scoring_system epss
scoring_elements 0.84184
published_at 2026-04-09T12:55:00Z
6
value 0.02136
scoring_system epss
scoring_elements 0.84202
published_at 2026-04-11T12:55:00Z
7
value 0.02136
scoring_system epss
scoring_elements 0.84197
published_at 2026-04-12T12:55:00Z
8
value 0.02136
scoring_system epss
scoring_elements 0.84193
published_at 2026-04-13T12:55:00Z
9
value 0.02136
scoring_system epss
scoring_elements 0.84215
published_at 2026-04-16T12:55:00Z
10
value 0.02136
scoring_system epss
scoring_elements 0.84216
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3695
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
10
reference_url http://secunia.com/advisories/60741
reference_id
reference_type
scores
url http://secunia.com/advisories/60741
11
reference_url http://secunia.com/advisories/61968
reference_id
reference_type
scores
url http://secunia.com/advisories/61968
12
reference_url http://www.debian.org/security/2014/dsa-3055
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3055
13
reference_url http://www.ubuntu.com/usn/USN-2390-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2390-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1154909
reference_id 1154909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1154909
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3695
reference_id CVE-2014-3695
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3695
26
reference_url https://access.redhat.com/errata/RHSA-2017:1854
reference_id RHSA-2017:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1854
27
reference_url https://usn.ubuntu.com/2390-1/
reference_id USN-2390-1
reference_type
scores
url https://usn.ubuntu.com/2390-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.10-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2014-3695
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6utr-f9hr-wkhd
18
url VCID-71bq-9kpe-wbc8
vulnerability_id VCID-71bq-9kpe-wbc8
summary Pidgin: Multiple NULL pointer dereference flaws in Yahoo protocol plug-in
references
0
reference_url http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c
1
reference_url http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1091.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1091.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1091
reference_id
reference_type
scores
0
value 0.01489
scoring_system epss
scoring_elements 0.81085
published_at 2026-04-18T12:55:00Z
1
value 0.01489
scoring_system epss
scoring_elements 0.80984
published_at 2026-04-01T12:55:00Z
2
value 0.01489
scoring_system epss
scoring_elements 0.80993
published_at 2026-04-02T12:55:00Z
3
value 0.01489
scoring_system epss
scoring_elements 0.81016
published_at 2026-04-04T12:55:00Z
4
value 0.01489
scoring_system epss
scoring_elements 0.81015
published_at 2026-04-07T12:55:00Z
5
value 0.01489
scoring_system epss
scoring_elements 0.81043
published_at 2026-04-08T12:55:00Z
6
value 0.01489
scoring_system epss
scoring_elements 0.8105
published_at 2026-04-09T12:55:00Z
7
value 0.01489
scoring_system epss
scoring_elements 0.81067
published_at 2026-04-11T12:55:00Z
8
value 0.01489
scoring_system epss
scoring_elements 0.81054
published_at 2026-04-12T12:55:00Z
9
value 0.01489
scoring_system epss
scoring_elements 0.81047
published_at 2026-04-13T12:55:00Z
10
value 0.01489
scoring_system epss
scoring_elements 0.81084
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1091
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091
7
reference_url http://secunia.com/advisories/43695
reference_id
reference_type
scores
url http://secunia.com/advisories/43695
8
reference_url http://secunia.com/advisories/43721
reference_id
reference_type
scores
url http://secunia.com/advisories/43721
9
reference_url http://secunia.com/advisories/46376
reference_id
reference_type
scores
url http://secunia.com/advisories/46376
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66055
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66055
11
reference_url https://hermes.opensuse.org/messages/13195955
reference_id
reference_type
scores
url https://hermes.opensuse.org/messages/13195955
12
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884
13
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402
14
reference_url http://www.pidgin.im/news/security/?id=51
reference_id
reference_type
scores
url http://www.pidgin.im/news/security/?id=51
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0616.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0616.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-1371.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-1371.html
17
reference_url http://www.securityfocus.com/bid/46837
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46837
18
reference_url http://www.vupen.com/english/advisories/2011/0643
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0643
19
reference_url http://www.vupen.com/english/advisories/2011/0661
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0661
20
reference_url http://www.vupen.com/english/advisories/2011/0669
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0669
21
reference_url http://www.vupen.com/english/advisories/2011/0703
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0703
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=683031
reference_id 683031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=683031
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1091
reference_id CVE-2011-1091
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1091
41
reference_url https://access.redhat.com/errata/RHSA-2011:0616
reference_id RHSA-2011:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0616
42
reference_url https://access.redhat.com/errata/RHSA-2011:1371
reference_id RHSA-2011:1371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1371
43
reference_url https://usn.ubuntu.com/1273-1/
reference_id USN-1273-1
reference_type
scores
url https://usn.ubuntu.com/1273-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.7.11-1?distro=trixie
purl pkg:deb/debian/pidgin@2.7.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.11-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2011-1091
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71bq-9kpe-wbc8
19
url VCID-7fz8-kr7a-xqfb
vulnerability_id VCID-7fz8-kr7a-xqfb
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2368
reference_id
reference_type
scores
0
value 0.06022
scoring_system epss
scoring_elements 0.90671
published_at 2026-04-01T12:55:00Z
1
value 0.06022
scoring_system epss
scoring_elements 0.90676
published_at 2026-04-02T12:55:00Z
2
value 0.06022
scoring_system epss
scoring_elements 0.90686
published_at 2026-04-04T12:55:00Z
3
value 0.06022
scoring_system epss
scoring_elements 0.90695
published_at 2026-04-07T12:55:00Z
4
value 0.06022
scoring_system epss
scoring_elements 0.90706
published_at 2026-04-08T12:55:00Z
5
value 0.06022
scoring_system epss
scoring_elements 0.90712
published_at 2026-04-09T12:55:00Z
6
value 0.06022
scoring_system epss
scoring_elements 0.90721
published_at 2026-04-12T12:55:00Z
7
value 0.06022
scoring_system epss
scoring_elements 0.90718
published_at 2026-04-13T12:55:00Z
8
value 0.06022
scoring_system epss
scoring_elements 0.90737
published_at 2026-04-16T12:55:00Z
9
value 0.06022
scoring_system epss
scoring_elements 0.90734
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348867
reference_id 1348867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348867
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2368
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fz8-kr7a-xqfb
20
url VCID-7u2r-rnyz-uyd5
vulnerability_id VCID-7u2r-rnyz-uyd5
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2375
reference_id
reference_type
scores
0
value 0.00483
scoring_system epss
scoring_elements 0.65102
published_at 2026-04-01T12:55:00Z
1
value 0.00483
scoring_system epss
scoring_elements 0.65152
published_at 2026-04-02T12:55:00Z
2
value 0.00483
scoring_system epss
scoring_elements 0.65177
published_at 2026-04-04T12:55:00Z
3
value 0.00483
scoring_system epss
scoring_elements 0.65143
published_at 2026-04-07T12:55:00Z
4
value 0.00483
scoring_system epss
scoring_elements 0.65193
published_at 2026-04-08T12:55:00Z
5
value 0.00483
scoring_system epss
scoring_elements 0.65205
published_at 2026-04-09T12:55:00Z
6
value 0.00483
scoring_system epss
scoring_elements 0.65223
published_at 2026-04-11T12:55:00Z
7
value 0.00483
scoring_system epss
scoring_elements 0.65211
published_at 2026-04-12T12:55:00Z
8
value 0.00483
scoring_system epss
scoring_elements 0.65183
published_at 2026-04-13T12:55:00Z
9
value 0.00483
scoring_system epss
scoring_elements 0.65218
published_at 2026-04-16T12:55:00Z
10
value 0.00483
scoring_system epss
scoring_elements 0.65228
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2375
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348880
reference_id 1348880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348880
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2375
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7u2r-rnyz-uyd5
21
url VCID-83az-td85-sudb
vulnerability_id VCID-83az-td85-sudb
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2380
reference_id
reference_type
scores
0
value 0.00534
scoring_system epss
scoring_elements 0.67335
published_at 2026-04-01T12:55:00Z
1
value 0.00534
scoring_system epss
scoring_elements 0.67371
published_at 2026-04-02T12:55:00Z
2
value 0.00534
scoring_system epss
scoring_elements 0.67393
published_at 2026-04-04T12:55:00Z
3
value 0.00534
scoring_system epss
scoring_elements 0.67372
published_at 2026-04-07T12:55:00Z
4
value 0.00534
scoring_system epss
scoring_elements 0.67423
published_at 2026-04-08T12:55:00Z
5
value 0.00534
scoring_system epss
scoring_elements 0.67437
published_at 2026-04-09T12:55:00Z
6
value 0.00534
scoring_system epss
scoring_elements 0.67459
published_at 2026-04-11T12:55:00Z
7
value 0.00534
scoring_system epss
scoring_elements 0.67446
published_at 2026-04-12T12:55:00Z
8
value 0.00534
scoring_system epss
scoring_elements 0.67413
published_at 2026-04-13T12:55:00Z
9
value 0.00534
scoring_system epss
scoring_elements 0.67449
published_at 2026-04-16T12:55:00Z
10
value 0.00534
scoring_system epss
scoring_elements 0.67461
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2380
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348856
reference_id 1348856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348856
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2380
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-83az-td85-sudb
22
url VCID-8951-ngtt-pfb5
vulnerability_id VCID-8951-ngtt-pfb5
summary pidgin: Improper validation of incoming plaintext messages in MSN protocol plug-in
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2318.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2318
reference_id
reference_type
scores
0
value 0.00845
scoring_system epss
scoring_elements 0.74736
published_at 2026-04-01T12:55:00Z
1
value 0.00845
scoring_system epss
scoring_elements 0.74739
published_at 2026-04-02T12:55:00Z
2
value 0.00845
scoring_system epss
scoring_elements 0.74766
published_at 2026-04-04T12:55:00Z
3
value 0.00845
scoring_system epss
scoring_elements 0.7474
published_at 2026-04-07T12:55:00Z
4
value 0.00845
scoring_system epss
scoring_elements 0.74773
published_at 2026-04-08T12:55:00Z
5
value 0.00845
scoring_system epss
scoring_elements 0.74788
published_at 2026-04-09T12:55:00Z
6
value 0.00845
scoring_system epss
scoring_elements 0.74812
published_at 2026-04-11T12:55:00Z
7
value 0.00845
scoring_system epss
scoring_elements 0.7479
published_at 2026-04-12T12:55:00Z
8
value 0.00845
scoring_system epss
scoring_elements 0.74781
published_at 2026-04-13T12:55:00Z
9
value 0.00845
scoring_system epss
scoring_elements 0.74816
published_at 2026-04-16T12:55:00Z
10
value 0.00845
scoring_system epss
scoring_elements 0.74824
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2318
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=819446
reference_id 819446
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=819446
4
reference_url https://access.redhat.com/errata/RHSA-2012:1102
reference_id RHSA-2012:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1102
5
reference_url https://usn.ubuntu.com/1500-1/
reference_id USN-1500-1
reference_type
scores
url https://usn.ubuntu.com/1500-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.4-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.4-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2012-2318
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8951-ngtt-pfb5
23
url VCID-8a4f-csqh-53fu
vulnerability_id VCID-8a4f-csqh-53fu
summary gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6486
reference_id
reference_type
scores
0
value 0.01267
scoring_system epss
scoring_elements 0.79415
published_at 2026-04-01T12:55:00Z
1
value 0.01267
scoring_system epss
scoring_elements 0.79421
published_at 2026-04-02T12:55:00Z
2
value 0.01267
scoring_system epss
scoring_elements 0.79444
published_at 2026-04-04T12:55:00Z
3
value 0.01267
scoring_system epss
scoring_elements 0.79431
published_at 2026-04-07T12:55:00Z
4
value 0.01267
scoring_system epss
scoring_elements 0.79459
published_at 2026-04-08T12:55:00Z
5
value 0.01267
scoring_system epss
scoring_elements 0.79469
published_at 2026-04-09T12:55:00Z
6
value 0.01267
scoring_system epss
scoring_elements 0.79491
published_at 2026-04-11T12:55:00Z
7
value 0.01267
scoring_system epss
scoring_elements 0.79474
published_at 2026-04-12T12:55:00Z
8
value 0.01267
scoring_system epss
scoring_elements 0.79464
published_at 2026-04-13T12:55:00Z
9
value 0.01267
scoring_system epss
scoring_elements 0.79495
published_at 2026-04-16T12:55:00Z
10
value 0.01267
scoring_system epss
scoring_elements 0.79492
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6486
fixed_packages
0
url pkg:deb/debian/pidgin@0?distro=trixie
purl pkg:deb/debian/pidgin@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@0%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6486
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8a4f-csqh-53fu
24
url VCID-9btk-pnjv-1qgb
vulnerability_id VCID-9btk-pnjv-1qgb
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2367
reference_id
reference_type
scores
0
value 0.01948
scoring_system epss
scoring_elements 0.83389
published_at 2026-04-01T12:55:00Z
1
value 0.01948
scoring_system epss
scoring_elements 0.83402
published_at 2026-04-02T12:55:00Z
2
value 0.01948
scoring_system epss
scoring_elements 0.83416
published_at 2026-04-07T12:55:00Z
3
value 0.01948
scoring_system epss
scoring_elements 0.8344
published_at 2026-04-08T12:55:00Z
4
value 0.01948
scoring_system epss
scoring_elements 0.8345
published_at 2026-04-09T12:55:00Z
5
value 0.01948
scoring_system epss
scoring_elements 0.83464
published_at 2026-04-11T12:55:00Z
6
value 0.01948
scoring_system epss
scoring_elements 0.83458
published_at 2026-04-12T12:55:00Z
7
value 0.01948
scoring_system epss
scoring_elements 0.83454
published_at 2026-04-13T12:55:00Z
8
value 0.01948
scoring_system epss
scoring_elements 0.83489
published_at 2026-04-16T12:55:00Z
9
value 0.01948
scoring_system epss
scoring_elements 0.83491
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348865
reference_id 1348865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348865
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2367
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9btk-pnjv-1qgb
25
url VCID-9hw9-a9yt-p7fv
vulnerability_id VCID-9hw9-a9yt-p7fv
summary
Multiple vulnerabilities have been discovered in Pidgin, allowing for
    remote arbitrary code execution, Denial of Service and service spoofing.
references
0
reference_url http://crisp.cs.du.edu/?q=ca2007-1
reference_id
reference_type
scores
url http://crisp.cs.du.edu/?q=ca2007-1
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2957.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2957.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2957
reference_id
reference_type
scores
0
value 0.01709
scoring_system epss
scoring_elements 0.82364
published_at 2026-04-18T12:55:00Z
1
value 0.01709
scoring_system epss
scoring_elements 0.8226
published_at 2026-04-01T12:55:00Z
2
value 0.01709
scoring_system epss
scoring_elements 0.82273
published_at 2026-04-02T12:55:00Z
3
value 0.01709
scoring_system epss
scoring_elements 0.82293
published_at 2026-04-04T12:55:00Z
4
value 0.01709
scoring_system epss
scoring_elements 0.82287
published_at 2026-04-07T12:55:00Z
5
value 0.01709
scoring_system epss
scoring_elements 0.82314
published_at 2026-04-08T12:55:00Z
6
value 0.01709
scoring_system epss
scoring_elements 0.82321
published_at 2026-04-09T12:55:00Z
7
value 0.01709
scoring_system epss
scoring_elements 0.82341
published_at 2026-04-11T12:55:00Z
8
value 0.01709
scoring_system epss
scoring_elements 0.82335
published_at 2026-04-12T12:55:00Z
9
value 0.01709
scoring_system epss
scoring_elements 0.82329
published_at 2026-04-13T12:55:00Z
10
value 0.01709
scoring_system epss
scoring_elements 0.82363
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2957
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957
4
reference_url http://secunia.com/advisories/32859
reference_id
reference_type
scores
url http://secunia.com/advisories/32859
5
reference_url http://secunia.com/advisories/33102
reference_id
reference_type
scores
url http://secunia.com/advisories/33102
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17599
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17599
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076
8
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:025
10
reference_url http://www.openwall.com/lists/oss-security/2008/06/27/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/06/27/3
11
reference_url http://www.redhat.com/support/errata/RHSA-2008-1023.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1023.html
12
reference_url http://www.securityfocus.com/bid/29985
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29985
13
reference_url http://www.ubuntu.com/usn/USN-675-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-675-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=453740
reference_id 453740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=453740
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632
reference_id 488632
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2957
reference_id CVE-2008-2957
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-2957
18
reference_url https://security.gentoo.org/glsa/200901-13
reference_id GLSA-200901-13
reference_type
scores
url https://security.gentoo.org/glsa/200901-13
19
reference_url https://access.redhat.com/errata/RHSA-2008:1023
reference_id RHSA-2008:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1023
20
reference_url https://usn.ubuntu.com/675-1/
reference_id USN-675-1
reference_type
scores
url https://usn.ubuntu.com/675-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.4.3-4?distro=trixie
purl pkg:deb/debian/pidgin@2.4.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-4%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2008-2957
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9hw9-a9yt-p7fv
26
url VCID-9npz-w7g5-r3b5
vulnerability_id VCID-9npz-w7g5-r3b5
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2370
reference_id
reference_type
scores
0
value 0.01953
scoring_system epss
scoring_elements 0.83407
published_at 2026-04-01T12:55:00Z
1
value 0.01953
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-02T12:55:00Z
2
value 0.01953
scoring_system epss
scoring_elements 0.83435
published_at 2026-04-04T12:55:00Z
3
value 0.01953
scoring_system epss
scoring_elements 0.83434
published_at 2026-04-07T12:55:00Z
4
value 0.01953
scoring_system epss
scoring_elements 0.83458
published_at 2026-04-08T12:55:00Z
5
value 0.01953
scoring_system epss
scoring_elements 0.83468
published_at 2026-04-09T12:55:00Z
6
value 0.01953
scoring_system epss
scoring_elements 0.83482
published_at 2026-04-11T12:55:00Z
7
value 0.01953
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-12T12:55:00Z
8
value 0.01953
scoring_system epss
scoring_elements 0.83471
published_at 2026-04-13T12:55:00Z
9
value 0.01953
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-16T12:55:00Z
10
value 0.01953
scoring_system epss
scoring_elements 0.83509
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348871
reference_id 1348871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348871
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2370
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9npz-w7g5-r3b5
27
url VCID-9sg6-dv5z-sbfq
vulnerability_id VCID-9sg6-dv5z-sbfq
summary
Multiple vulnerabilities have been discovered in Pidgin, allowing for
    remote arbitrary code execution, Denial of Service and service spoofing.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2955.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2955
reference_id
reference_type
scores
0
value 0.17668
scoring_system epss
scoring_elements 0.95117
published_at 2026-04-18T12:55:00Z
1
value 0.17668
scoring_system epss
scoring_elements 0.95072
published_at 2026-04-01T12:55:00Z
2
value 0.17668
scoring_system epss
scoring_elements 0.95083
published_at 2026-04-04T12:55:00Z
3
value 0.17668
scoring_system epss
scoring_elements 0.95085
published_at 2026-04-07T12:55:00Z
4
value 0.17668
scoring_system epss
scoring_elements 0.95092
published_at 2026-04-08T12:55:00Z
5
value 0.17668
scoring_system epss
scoring_elements 0.95096
published_at 2026-04-09T12:55:00Z
6
value 0.17668
scoring_system epss
scoring_elements 0.95102
published_at 2026-04-11T12:55:00Z
7
value 0.17668
scoring_system epss
scoring_elements 0.95103
published_at 2026-04-12T12:55:00Z
8
value 0.17668
scoring_system epss
scoring_elements 0.95106
published_at 2026-04-13T12:55:00Z
9
value 0.17668
scoring_system epss
scoring_elements 0.95115
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2955
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955
3
reference_url http://secunia.com/advisories/30881
reference_id
reference_type
scores
url http://secunia.com/advisories/30881
4
reference_url http://secunia.com/advisories/32859
reference_id
reference_type
scores
url http://secunia.com/advisories/32859
5
reference_url http://secunia.com/advisories/33102
reference_id
reference_type
scores
url http://secunia.com/advisories/33102
6
reference_url http://securityreason.com/securityalert/3966
reference_id
reference_type
scores
url http://securityreason.com/securityalert/3966
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10131
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10131
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18050
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18050
9
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:025
11
reference_url http://www.redhat.com/support/errata/RHSA-2008-1023.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1023.html
12
reference_url http://www.securityfocus.com/archive/1/493682/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493682/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/29985
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29985
14
reference_url http://www.ubuntu.com/usn/USN-675-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-675-1
15
reference_url http://www.vupen.com/english/advisories/2008/1947
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1947
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=453736
reference_id 453736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=453736
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632
reference_id 488632
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2955
reference_id CVE-2008-2955
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-2955
20
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32749.txt
reference_id CVE-2008-2955;OSVDB-46576
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32749.txt
21
reference_url https://www.securityfocus.com/bid/33414/info
reference_id CVE-2008-2955;OSVDB-46576
reference_type exploit
scores
url https://www.securityfocus.com/bid/33414/info
22
reference_url https://security.gentoo.org/glsa/200901-13
reference_id GLSA-200901-13
reference_type
scores
url https://security.gentoo.org/glsa/200901-13
23
reference_url https://access.redhat.com/errata/RHSA-2008:1023
reference_id RHSA-2008:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1023
24
reference_url https://usn.ubuntu.com/675-1/
reference_id USN-675-1
reference_type
scores
url https://usn.ubuntu.com/675-1/
25
reference_url https://usn.ubuntu.com/886-1/
reference_id USN-886-1
reference_type
scores
url https://usn.ubuntu.com/886-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.4.3-1?distro=trixie
purl pkg:deb/debian/pidgin@2.4.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2008-2955
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9sg6-dv5z-sbfq
28
url VCID-ach7-fhrx-zqd3
vulnerability_id VCID-ach7-fhrx-zqd3
summary (libpurple): Invalid UTF-8 string handling in OSCAR messages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4601.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4601
reference_id
reference_type
scores
0
value 0.0379
scoring_system epss
scoring_elements 0.88018
published_at 2026-04-01T12:55:00Z
1
value 0.0379
scoring_system epss
scoring_elements 0.88027
published_at 2026-04-02T12:55:00Z
2
value 0.0379
scoring_system epss
scoring_elements 0.88042
published_at 2026-04-04T12:55:00Z
3
value 0.0379
scoring_system epss
scoring_elements 0.88048
published_at 2026-04-07T12:55:00Z
4
value 0.0379
scoring_system epss
scoring_elements 0.88067
published_at 2026-04-08T12:55:00Z
5
value 0.0379
scoring_system epss
scoring_elements 0.88073
published_at 2026-04-09T12:55:00Z
6
value 0.0379
scoring_system epss
scoring_elements 0.88083
published_at 2026-04-11T12:55:00Z
7
value 0.0379
scoring_system epss
scoring_elements 0.88076
published_at 2026-04-12T12:55:00Z
8
value 0.0379
scoring_system epss
scoring_elements 0.88077
published_at 2026-04-13T12:55:00Z
9
value 0.0379
scoring_system epss
scoring_elements 0.8809
published_at 2026-04-16T12:55:00Z
10
value 0.0379
scoring_system epss
scoring_elements 0.88088
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4601
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=761517
reference_id 761517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=761517
4
reference_url https://access.redhat.com/errata/RHSA-2011:1820
reference_id RHSA-2011:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1820
5
reference_url https://access.redhat.com/errata/RHSA-2011:1821
reference_id RHSA-2011:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1821
6
reference_url https://usn.ubuntu.com/1500-1/
reference_id USN-1500-1
reference_type
scores
url https://usn.ubuntu.com/1500-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2011-4601
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ach7-fhrx-zqd3
29
url VCID-ag3e-ee6x-tbcv
vulnerability_id VCID-ag3e-ee6x-tbcv
summary
Multiple vulnerabilities have been discovered in Pidgin, allowing for
    remote arbitrary code execution, Denial of Service and service spoofing.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434
1
reference_url http://developer.pidgin.im/attachment/ticket/6500/nss_add_rev.patch
reference_id
reference_type
scores
url http://developer.pidgin.im/attachment/ticket/6500/nss_add_rev.patch
2
reference_url http://developer.pidgin.im/attachment/ticket/6500/nss-cert-verify.patch
reference_id
reference_type
scores
url http://developer.pidgin.im/attachment/ticket/6500/nss-cert-verify.patch
3
reference_url http://developer.pidgin.im/ticket/6500
reference_id
reference_type
scores
url http://developer.pidgin.im/ticket/6500
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3532.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3532.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3532
reference_id
reference_type
scores
0
value 0.03446
scoring_system epss
scoring_elements 0.87511
published_at 2026-04-18T12:55:00Z
1
value 0.03446
scoring_system epss
scoring_elements 0.87439
published_at 2026-04-01T12:55:00Z
2
value 0.03446
scoring_system epss
scoring_elements 0.87449
published_at 2026-04-02T12:55:00Z
3
value 0.03446
scoring_system epss
scoring_elements 0.87463
published_at 2026-04-04T12:55:00Z
4
value 0.03446
scoring_system epss
scoring_elements 0.87464
published_at 2026-04-07T12:55:00Z
5
value 0.03446
scoring_system epss
scoring_elements 0.87484
published_at 2026-04-08T12:55:00Z
6
value 0.03446
scoring_system epss
scoring_elements 0.8749
published_at 2026-04-09T12:55:00Z
7
value 0.03446
scoring_system epss
scoring_elements 0.87501
published_at 2026-04-11T12:55:00Z
8
value 0.03446
scoring_system epss
scoring_elements 0.87497
published_at 2026-04-12T12:55:00Z
9
value 0.03446
scoring_system epss
scoring_elements 0.87494
published_at 2026-04-13T12:55:00Z
10
value 0.03446
scoring_system epss
scoring_elements 0.87509
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3532
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532
7
reference_url http://secunia.com/advisories/31390
reference_id
reference_type
scores
url http://secunia.com/advisories/31390
8
reference_url http://secunia.com/advisories/32859
reference_id
reference_type
scores
url http://secunia.com/advisories/32859
9
reference_url http://secunia.com/advisories/33102
reference_id
reference_type
scores
url http://secunia.com/advisories/33102
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44220
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44220
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10979
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10979
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18327
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18327
13
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:025
15
reference_url http://www.redhat.com/support/errata/RHSA-2008-1023.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1023.html
16
reference_url http://www.securityfocus.com/bid/30553
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30553
17
reference_url http://www.ubuntu.com/usn/USN-675-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-675-1
18
reference_url http://www.vupen.com/english/advisories/2008/2318
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2318
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=457907
reference_id 457907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=457907
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434
reference_id 492434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3532
reference_id CVE-2008-3532
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3532
23
reference_url https://security.gentoo.org/glsa/200901-13
reference_id GLSA-200901-13
reference_type
scores
url https://security.gentoo.org/glsa/200901-13
24
reference_url https://access.redhat.com/errata/RHSA-2008:1023
reference_id RHSA-2008:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1023
25
reference_url https://usn.ubuntu.com/675-1/
reference_id USN-675-1
reference_type
scores
url https://usn.ubuntu.com/675-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.4.3-2?distro=trixie
purl pkg:deb/debian/pidgin@2.4.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-2%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2008-3532
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ag3e-ee6x-tbcv
30
url VCID-b7pa-sgwm-cbea
vulnerability_id VCID-b7pa-sgwm-cbea
summary pidgin: Finch XMPP MUC Crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0420.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0420
reference_id
reference_type
scores
0
value 0.03316
scoring_system epss
scoring_elements 0.8721
published_at 2026-04-01T12:55:00Z
1
value 0.03316
scoring_system epss
scoring_elements 0.8722
published_at 2026-04-02T12:55:00Z
2
value 0.03316
scoring_system epss
scoring_elements 0.87236
published_at 2026-04-04T12:55:00Z
3
value 0.03316
scoring_system epss
scoring_elements 0.87233
published_at 2026-04-07T12:55:00Z
4
value 0.03316
scoring_system epss
scoring_elements 0.87252
published_at 2026-04-08T12:55:00Z
5
value 0.03316
scoring_system epss
scoring_elements 0.8726
published_at 2026-04-09T12:55:00Z
6
value 0.03316
scoring_system epss
scoring_elements 0.87272
published_at 2026-04-11T12:55:00Z
7
value 0.03316
scoring_system epss
scoring_elements 0.87266
published_at 2026-04-12T12:55:00Z
8
value 0.03316
scoring_system epss
scoring_elements 0.87262
published_at 2026-04-13T12:55:00Z
9
value 0.03316
scoring_system epss
scoring_elements 0.87277
published_at 2026-04-16T12:55:00Z
10
value 0.03316
scoring_system epss
scoring_elements 0.87281
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=565786
reference_id 565786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=565786
4
reference_url https://access.redhat.com/errata/RHSA-2010:0115
reference_id RHSA-2010:0115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0115
5
reference_url https://usn.ubuntu.com/902-1/
reference_id USN-902-1
reference_type
scores
url https://usn.ubuntu.com/902-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.6-1?distro=trixie
purl pkg:deb/debian/pidgin@2.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2010-0420
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7pa-sgwm-cbea
31
url VCID-b8e9-rkt5-cfch
vulnerability_id VCID-b8e9-rkt5-cfch
summary
Multiple vulnerabilities have been discovered in Pidgin, leading to the
    remote execution of arbitrary code, unauthorized information disclosure, or
    Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3026.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3026.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3026
reference_id
reference_type
scores
0
value 0.00526
scoring_system epss
scoring_elements 0.66964
published_at 2026-04-01T12:55:00Z
1
value 0.00526
scoring_system epss
scoring_elements 0.67001
published_at 2026-04-02T12:55:00Z
2
value 0.00526
scoring_system epss
scoring_elements 0.67026
published_at 2026-04-04T12:55:00Z
3
value 0.00526
scoring_system epss
scoring_elements 0.67
published_at 2026-04-07T12:55:00Z
4
value 0.00526
scoring_system epss
scoring_elements 0.67049
published_at 2026-04-08T12:55:00Z
5
value 0.00526
scoring_system epss
scoring_elements 0.67062
published_at 2026-04-09T12:55:00Z
6
value 0.00526
scoring_system epss
scoring_elements 0.67081
published_at 2026-04-11T12:55:00Z
7
value 0.00526
scoring_system epss
scoring_elements 0.67067
published_at 2026-04-12T12:55:00Z
8
value 0.00526
scoring_system epss
scoring_elements 0.67036
published_at 2026-04-13T12:55:00Z
9
value 0.00526
scoring_system epss
scoring_elements 0.67069
published_at 2026-04-16T12:55:00Z
10
value 0.00526
scoring_system epss
scoring_elements 0.67083
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3026
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=519224
reference_id 519224
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=519224
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542891
reference_id 542891
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542891
5
reference_url https://security.gentoo.org/glsa/200910-02
reference_id GLSA-200910-02
reference_type
scores
url https://security.gentoo.org/glsa/200910-02
6
reference_url https://access.redhat.com/errata/RHSA-2009:1453
reference_id RHSA-2009:1453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1453
7
reference_url https://usn.ubuntu.com/886-1/
reference_id USN-886-1
reference_type
scores
url https://usn.ubuntu.com/886-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-3026
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8e9-rkt5-cfch
32
url VCID-b8zp-g4xa-t7ad
vulnerability_id VCID-b8zp-g4xa-t7ad
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6481.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6481
reference_id
reference_type
scores
0
value 0.01006
scoring_system epss
scoring_elements 0.76987
published_at 2026-04-01T12:55:00Z
1
value 0.01006
scoring_system epss
scoring_elements 0.76992
published_at 2026-04-02T12:55:00Z
2
value 0.01006
scoring_system epss
scoring_elements 0.77021
published_at 2026-04-04T12:55:00Z
3
value 0.01006
scoring_system epss
scoring_elements 0.77002
published_at 2026-04-07T12:55:00Z
4
value 0.01006
scoring_system epss
scoring_elements 0.77034
published_at 2026-04-08T12:55:00Z
5
value 0.01006
scoring_system epss
scoring_elements 0.77045
published_at 2026-04-09T12:55:00Z
6
value 0.01006
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-11T12:55:00Z
7
value 0.01006
scoring_system epss
scoring_elements 0.77052
published_at 2026-04-12T12:55:00Z
8
value 0.01006
scoring_system epss
scoring_elements 0.77047
published_at 2026-04-13T12:55:00Z
9
value 0.01006
scoring_system epss
scoring_elements 0.77088
published_at 2026-04-16T12:55:00Z
10
value 0.01006
scoring_system epss
scoring_elements 0.77089
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6481
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1056908
reference_id 1056908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1056908
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6481
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8zp-g4xa-t7ad
33
url VCID-bqxx-44k8-t7fd
vulnerability_id VCID-bqxx-44k8-t7fd
summary security update
references
0
reference_url http://hg.pidgin.im/pidgin/main/rev/ea46ab68f0dc
reference_id
reference_type
scores
url http://hg.pidgin.im/pidgin/main/rev/ea46ab68f0dc
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
3
reference_url http://pidgin.im/news/security/?id=90
reference_id
reference_type
scores
url http://pidgin.im/news/security/?id=90
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3698.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3698.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3698
reference_id
reference_type
scores
0
value 0.01332
scoring_system epss
scoring_elements 0.7991
published_at 2026-04-01T12:55:00Z
1
value 0.01332
scoring_system epss
scoring_elements 0.79916
published_at 2026-04-02T12:55:00Z
2
value 0.01332
scoring_system epss
scoring_elements 0.79937
published_at 2026-04-04T12:55:00Z
3
value 0.01332
scoring_system epss
scoring_elements 0.79926
published_at 2026-04-07T12:55:00Z
4
value 0.01332
scoring_system epss
scoring_elements 0.79955
published_at 2026-04-08T12:55:00Z
5
value 0.01332
scoring_system epss
scoring_elements 0.79964
published_at 2026-04-09T12:55:00Z
6
value 0.01332
scoring_system epss
scoring_elements 0.79983
published_at 2026-04-11T12:55:00Z
7
value 0.01332
scoring_system epss
scoring_elements 0.79967
published_at 2026-04-12T12:55:00Z
8
value 0.01332
scoring_system epss
scoring_elements 0.79958
published_at 2026-04-13T12:55:00Z
9
value 0.01332
scoring_system epss
scoring_elements 0.79986
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3698
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
10
reference_url http://secunia.com/advisories/60741
reference_id
reference_type
scores
url http://secunia.com/advisories/60741
11
reference_url http://secunia.com/advisories/61968
reference_id
reference_type
scores
url http://secunia.com/advisories/61968
12
reference_url http://www.debian.org/security/2014/dsa-3055
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3055
13
reference_url http://www.ubuntu.com/usn/USN-2390-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2390-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1154911
reference_id 1154911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1154911
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3698
reference_id CVE-2014-3698
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3698
26
reference_url https://access.redhat.com/errata/RHSA-2017:1854
reference_id RHSA-2017:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1854
27
reference_url https://usn.ubuntu.com/2390-1/
reference_id USN-2390-1
reference_type
scores
url https://usn.ubuntu.com/2390-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.10-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2014-3698
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bqxx-44k8-t7fd
34
url VCID-ca59-9ma2-nyek
vulnerability_id VCID-ca59-9ma2-nyek
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2371
reference_id
reference_type
scores
0
value 0.03521
scoring_system epss
scoring_elements 0.8759
published_at 2026-04-01T12:55:00Z
1
value 0.03521
scoring_system epss
scoring_elements 0.876
published_at 2026-04-02T12:55:00Z
2
value 0.03521
scoring_system epss
scoring_elements 0.87613
published_at 2026-04-04T12:55:00Z
3
value 0.03521
scoring_system epss
scoring_elements 0.87616
published_at 2026-04-07T12:55:00Z
4
value 0.03521
scoring_system epss
scoring_elements 0.87636
published_at 2026-04-08T12:55:00Z
5
value 0.03521
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-09T12:55:00Z
6
value 0.03521
scoring_system epss
scoring_elements 0.87653
published_at 2026-04-11T12:55:00Z
7
value 0.03521
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-12T12:55:00Z
8
value 0.03521
scoring_system epss
scoring_elements 0.87645
published_at 2026-04-13T12:55:00Z
9
value 0.03521
scoring_system epss
scoring_elements 0.8766
published_at 2026-04-16T12:55:00Z
10
value 0.03521
scoring_system epss
scoring_elements 0.87661
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2371
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348873
reference_id 1348873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348873
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2371
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ca59-9ma2-nyek
35
url VCID-cd64-6y6b-rfa3
vulnerability_id VCID-cd64-6y6b-rfa3
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2374
reference_id
reference_type
scores
0
value 0.02781
scoring_system epss
scoring_elements 0.86001
published_at 2026-04-01T12:55:00Z
1
value 0.02781
scoring_system epss
scoring_elements 0.86012
published_at 2026-04-02T12:55:00Z
2
value 0.02781
scoring_system epss
scoring_elements 0.86029
published_at 2026-04-07T12:55:00Z
3
value 0.02781
scoring_system epss
scoring_elements 0.86048
published_at 2026-04-08T12:55:00Z
4
value 0.02781
scoring_system epss
scoring_elements 0.86058
published_at 2026-04-09T12:55:00Z
5
value 0.02781
scoring_system epss
scoring_elements 0.86072
published_at 2026-04-11T12:55:00Z
6
value 0.02781
scoring_system epss
scoring_elements 0.8607
published_at 2026-04-12T12:55:00Z
7
value 0.02781
scoring_system epss
scoring_elements 0.86065
published_at 2026-04-13T12:55:00Z
8
value 0.02781
scoring_system epss
scoring_elements 0.86082
published_at 2026-04-16T12:55:00Z
9
value 0.02781
scoring_system epss
scoring_elements 0.86088
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2374
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348878
reference_id 1348878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348878
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2374
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cd64-6y6b-rfa3
36
url VCID-cmm5-mw5m-bud2
vulnerability_id VCID-cmm5-mw5m-bud2
summary
A vulnerability in Pidgin might allow remote attackers to execute
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2640.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2640
reference_id
reference_type
scores
0
value 0.0073
scoring_system epss
scoring_elements 0.72712
published_at 2026-04-18T12:55:00Z
1
value 0.0073
scoring_system epss
scoring_elements 0.72686
published_at 2026-04-11T12:55:00Z
2
value 0.0073
scoring_system epss
scoring_elements 0.72669
published_at 2026-04-12T12:55:00Z
3
value 0.0073
scoring_system epss
scoring_elements 0.72659
published_at 2026-04-13T12:55:00Z
4
value 0.0073
scoring_system epss
scoring_elements 0.72701
published_at 2026-04-16T12:55:00Z
5
value 0.0073
scoring_system epss
scoring_elements 0.72635
published_at 2026-04-04T12:55:00Z
6
value 0.0073
scoring_system epss
scoring_elements 0.72613
published_at 2026-04-07T12:55:00Z
7
value 0.0073
scoring_system epss
scoring_elements 0.72651
published_at 2026-04-08T12:55:00Z
8
value 0.0073
scoring_system epss
scoring_elements 0.72663
published_at 2026-04-09T12:55:00Z
9
value 0.00952
scoring_system epss
scoring_elements 0.76335
published_at 2026-04-02T12:55:00Z
10
value 0.00952
scoring_system epss
scoring_elements 0.76331
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1430019
reference_id 1430019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1430019
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859159
reference_id 859159
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859159
6
reference_url https://security.archlinux.org/ASA-201703-18
reference_id ASA-201703-18
reference_type
scores
url https://security.archlinux.org/ASA-201703-18
7
reference_url https://security.archlinux.org/AVG-226
reference_id AVG-226
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-226
8
reference_url https://security.gentoo.org/glsa/201706-10
reference_id GLSA-201706-10
reference_type
scores
url https://security.gentoo.org/glsa/201706-10
9
reference_url https://access.redhat.com/errata/RHSA-2017:1854
reference_id RHSA-2017:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1854
10
reference_url https://usn.ubuntu.com/3231-1/
reference_id USN-3231-1
reference_type
scores
url https://usn.ubuntu.com/3231-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.12.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.12.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2017-2640
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmm5-mw5m-bud2
37
url VCID-cxh3-6xaf-q7fa
vulnerability_id VCID-cxh3-6xaf-q7fa
summary pidgin: Invalid memory dereference in the XMPP protocol plug-in by processing serie of specially-crafted file transfer requests
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2214.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2214
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67633
published_at 2026-04-01T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67669
published_at 2026-04-02T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.6769
published_at 2026-04-04T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.6767
published_at 2026-04-07T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67722
published_at 2026-04-08T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67736
published_at 2026-04-09T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.6776
published_at 2026-04-18T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67745
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67712
published_at 2026-04-13T12:55:00Z
9
value 0.00543
scoring_system epss
scoring_elements 0.67747
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=819449
reference_id 819449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=819449
4
reference_url https://usn.ubuntu.com/1500-1/
reference_id USN-1500-1
reference_type
scores
url https://usn.ubuntu.com/1500-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.4-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.4-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2012-2214
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cxh3-6xaf-q7fa
38
url VCID-dw47-rgd5-yked
vulnerability_id VCID-dw47-rgd5-yked
summary Pidgin: MSN DirectConnect DoS (crash) after receiving a short P2P message
references
0
reference_url http://developer.pidgin.im/viewmtn/revision/diff/e76f4ad4ef2f10588195a0eedc7a08f82062f79c/with/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031/libpurple/protocols/msn/directconn.c
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/diff/e76f4ad4ef2f10588195a0eedc7a08f82062f79c/with/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031/libpurple/protocols/msn/directconn.c
1
reference_url http://developer.pidgin.im/viewmtn/revision/info/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/info/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052862.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052862.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052905.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052905.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
5
reference_url http://pidgin.im/pipermail/support/2010-December/009251.html
reference_id
reference_type
scores
url http://pidgin.im/pipermail/support/2010-December/009251.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4528.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4528.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4528
reference_id
reference_type
scores
0
value 0.02691
scoring_system epss
scoring_elements 0.85888
published_at 2026-04-18T12:55:00Z
1
value 0.02691
scoring_system epss
scoring_elements 0.85794
published_at 2026-04-01T12:55:00Z
2
value 0.02691
scoring_system epss
scoring_elements 0.85806
published_at 2026-04-02T12:55:00Z
3
value 0.02691
scoring_system epss
scoring_elements 0.85824
published_at 2026-04-04T12:55:00Z
4
value 0.02691
scoring_system epss
scoring_elements 0.85828
published_at 2026-04-07T12:55:00Z
5
value 0.02691
scoring_system epss
scoring_elements 0.85847
published_at 2026-04-08T12:55:00Z
6
value 0.02691
scoring_system epss
scoring_elements 0.85857
published_at 2026-04-09T12:55:00Z
7
value 0.02691
scoring_system epss
scoring_elements 0.85872
published_at 2026-04-11T12:55:00Z
8
value 0.02691
scoring_system epss
scoring_elements 0.85869
published_at 2026-04-12T12:55:00Z
9
value 0.02691
scoring_system epss
scoring_elements 0.85865
published_at 2026-04-13T12:55:00Z
10
value 0.02691
scoring_system epss
scoring_elements 0.85883
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4528
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4528
9
reference_url http://secunia.com/advisories/42732
reference_id
reference_type
scores
url http://secunia.com/advisories/42732
10
reference_url http://secunia.com/advisories/42824
reference_id
reference_type
scores
url http://secunia.com/advisories/42824
11
reference_url http://secunia.com/advisories/42877
reference_id
reference_type
scores
url http://secunia.com/advisories/42877
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18461
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18461
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:259
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:259
14
reference_url http://www.openwall.com/lists/oss-security/2010/12/27/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/12/27/1
15
reference_url http://www.openwall.com/lists/oss-security/2010/12/31/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/12/31/5
16
reference_url http://www.pidgin.im/news/security/?id=49
reference_id
reference_type
scores
url http://www.pidgin.im/news/security/?id=49
17
reference_url http://www.securityfocus.com/bid/45581
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45581
18
reference_url http://www.vupen.com/english/advisories/2011/0028
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0028
19
reference_url http://www.vupen.com/english/advisories/2011/0054
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0054
20
reference_url http://www.vupen.com/english/advisories/2011/0076
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0076
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608331
reference_id 608331
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608331
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=665421
reference_id 665421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=665421
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4528
reference_id CVE-2010-4528
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4528
fixed_packages
0
url pkg:deb/debian/pidgin@2.7.9-1?distro=trixie
purl pkg:deb/debian/pidgin@2.7.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.9-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2010-4528
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dw47-rgd5-yked
39
url VCID-ebg2-bj5n-tycb
vulnerability_id VCID-ebg2-bj5n-tycb
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6490.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6490
reference_id
reference_type
scores
0
value 0.38978
scoring_system epss
scoring_elements 0.97246
published_at 2026-04-01T12:55:00Z
1
value 0.38978
scoring_system epss
scoring_elements 0.97251
published_at 2026-04-02T12:55:00Z
2
value 0.38978
scoring_system epss
scoring_elements 0.97257
published_at 2026-04-04T12:55:00Z
3
value 0.38978
scoring_system epss
scoring_elements 0.97258
published_at 2026-04-07T12:55:00Z
4
value 0.38978
scoring_system epss
scoring_elements 0.97264
published_at 2026-04-08T12:55:00Z
5
value 0.38978
scoring_system epss
scoring_elements 0.97265
published_at 2026-04-09T12:55:00Z
6
value 0.38978
scoring_system epss
scoring_elements 0.97269
published_at 2026-04-11T12:55:00Z
7
value 0.38978
scoring_system epss
scoring_elements 0.9727
published_at 2026-04-13T12:55:00Z
8
value 0.38978
scoring_system epss
scoring_elements 0.97278
published_at 2026-04-16T12:55:00Z
9
value 0.38978
scoring_system epss
scoring_elements 0.9728
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1057498
reference_id 1057498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1057498
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6490
risk_score 0.2
exploitability 0.5
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebg2-bj5n-tycb
40
url VCID-ektc-z3zf-dfep
vulnerability_id VCID-ektc-z3zf-dfep
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c
reference_id
reference_type
scores
url http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0272.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0272.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0272
reference_id
reference_type
scores
0
value 0.01896
scoring_system epss
scoring_elements 0.83248
published_at 2026-04-18T12:55:00Z
1
value 0.01896
scoring_system epss
scoring_elements 0.83145
published_at 2026-04-01T12:55:00Z
2
value 0.01896
scoring_system epss
scoring_elements 0.83162
published_at 2026-04-02T12:55:00Z
3
value 0.01896
scoring_system epss
scoring_elements 0.83175
published_at 2026-04-04T12:55:00Z
4
value 0.01896
scoring_system epss
scoring_elements 0.83174
published_at 2026-04-07T12:55:00Z
5
value 0.01896
scoring_system epss
scoring_elements 0.83199
published_at 2026-04-08T12:55:00Z
6
value 0.01896
scoring_system epss
scoring_elements 0.83205
published_at 2026-04-09T12:55:00Z
7
value 0.01896
scoring_system epss
scoring_elements 0.83221
published_at 2026-04-11T12:55:00Z
8
value 0.01896
scoring_system epss
scoring_elements 0.83215
published_at 2026-04-12T12:55:00Z
9
value 0.01896
scoring_system epss
scoring_elements 0.83211
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0272
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474
8
reference_url http://www.pidgin.im/news/security/?id=66
reference_id
reference_type
scores
url http://www.pidgin.im/news/security/?id=66
9
reference_url http://www.securityfocus.com/bid/57951
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57951
10
reference_url http://www.ubuntu.com/usn/USN-1746-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1746-1
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=910040
reference_id 910040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=910040
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0272
reference_id CVE-2013-0272
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0272
64
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
65
reference_url https://access.redhat.com/errata/RHSA-2013:0646
reference_id RHSA-2013:0646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0646
66
reference_url https://usn.ubuntu.com/1746-1/
reference_id USN-1746-1
reference_type
scores
url https://usn.ubuntu.com/1746-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.6-3?distro=trixie
purl pkg:deb/debian/pidgin@2.10.6-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-0272
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ektc-z3zf-dfep
41
url VCID-et2z-svg6-m3ef
vulnerability_id VCID-et2z-svg6-m3ef
summary pidgin: Remote crash in MSN protocol plugin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3184.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3184
reference_id
reference_type
scores
0
value 0.02692
scoring_system epss
scoring_elements 0.85796
published_at 2026-04-01T12:55:00Z
1
value 0.02692
scoring_system epss
scoring_elements 0.85807
published_at 2026-04-02T12:55:00Z
2
value 0.02692
scoring_system epss
scoring_elements 0.85825
published_at 2026-04-04T12:55:00Z
3
value 0.02692
scoring_system epss
scoring_elements 0.8583
published_at 2026-04-07T12:55:00Z
4
value 0.02692
scoring_system epss
scoring_elements 0.85848
published_at 2026-04-08T12:55:00Z
5
value 0.02692
scoring_system epss
scoring_elements 0.85858
published_at 2026-04-09T12:55:00Z
6
value 0.02692
scoring_system epss
scoring_elements 0.85873
published_at 2026-04-11T12:55:00Z
7
value 0.02692
scoring_system epss
scoring_elements 0.8587
published_at 2026-04-12T12:55:00Z
8
value 0.02692
scoring_system epss
scoring_elements 0.85866
published_at 2026-04-13T12:55:00Z
9
value 0.02692
scoring_system epss
scoring_elements 0.85885
published_at 2026-04-16T12:55:00Z
10
value 0.02692
scoring_system epss
scoring_elements 0.85889
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3184
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=732405
reference_id 732405
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=732405
4
reference_url https://usn.ubuntu.com/1273-1/
reference_id USN-1273-1
reference_type
scores
url https://usn.ubuntu.com/1273-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2011-3184
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-et2z-svg6-m3ef
42
url VCID-ftdp-6cub-sqah
vulnerability_id VCID-ftdp-6cub-sqah
summary Pidgin: MSN SLP emoticon DoS (NULL pointer dereference)
references
0
reference_url http://developer.pidgin.im/viewmtn/revision/diff/884d44222e8c81ecec51c25e07d005e002a5479b/with/894460d22c434e73d60b71ec031611988e687c8b/libpurple/protocols/msn/slp.c
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/diff/884d44222e8c81ecec51c25e07d005e002a5479b/with/894460d22c434e73d60b71ec031611988e687c8b/libpurple/protocols/msn/slp.c
1
reference_url http://developer.pidgin.im/viewmtn/revision/info/894460d22c434e73d60b71ec031611988e687c8b
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/info/894460d22c434e73d60b71ec031611988e687c8b
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1624.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1624.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1624
reference_id
reference_type
scores
0
value 0.03095
scoring_system epss
scoring_elements 0.86815
published_at 2026-04-18T12:55:00Z
1
value 0.03095
scoring_system epss
scoring_elements 0.86734
published_at 2026-04-01T12:55:00Z
2
value 0.03095
scoring_system epss
scoring_elements 0.86744
published_at 2026-04-02T12:55:00Z
3
value 0.03095
scoring_system epss
scoring_elements 0.86764
published_at 2026-04-04T12:55:00Z
4
value 0.03095
scoring_system epss
scoring_elements 0.86762
published_at 2026-04-07T12:55:00Z
5
value 0.03095
scoring_system epss
scoring_elements 0.86781
published_at 2026-04-08T12:55:00Z
6
value 0.03095
scoring_system epss
scoring_elements 0.8679
published_at 2026-04-09T12:55:00Z
7
value 0.03095
scoring_system epss
scoring_elements 0.86803
published_at 2026-04-11T12:55:00Z
8
value 0.03095
scoring_system epss
scoring_elements 0.868
published_at 2026-04-12T12:55:00Z
9
value 0.03095
scoring_system epss
scoring_elements 0.86796
published_at 2026-04-13T12:55:00Z
10
value 0.03095
scoring_system epss
scoring_elements 0.86811
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1624
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624
5
reference_url http://secunia.com/advisories/39801
reference_id
reference_type
scores
url http://secunia.com/advisories/39801
6
reference_url http://secunia.com/advisories/41899
reference_id
reference_type
scores
url http://secunia.com/advisories/41899
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/58559
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/58559
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18547
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18547
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:097
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:097
10
reference_url http://www.pidgin.im/news/security/index.php?id=46
reference_id
reference_type
scores
url http://www.pidgin.im/news/security/index.php?id=46
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0788.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0788.html
12
reference_url http://www.securityfocus.com/bid/40138
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40138
13
reference_url http://www.ubuntu.com/usn/USN-1014-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1014-1
14
reference_url http://www.vupen.com/english/advisories/2010/1141
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1141
15
reference_url http://www.vupen.com/english/advisories/2010/2755
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2755
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=589973
reference_id 589973
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=589973
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1624
reference_id CVE-2010-1624
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1624
23
reference_url https://access.redhat.com/errata/RHSA-2010:0788
reference_id RHSA-2010:0788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0788
24
reference_url https://usn.ubuntu.com/1014-1/
reference_id USN-1014-1
reference_type
scores
url https://usn.ubuntu.com/1014-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.7.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2010-1624
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftdp-6cub-sqah
43
url VCID-g8q8-pb2g-qfct
vulnerability_id VCID-g8q8-pb2g-qfct
summary
Multiple vulnerabilities have been discovered in Pidgin, leading to the
    remote execution of arbitrary code, unauthorized information disclosure, or
    Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1889.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1889.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1889
reference_id
reference_type
scores
0
value 0.03236
scoring_system epss
scoring_elements 0.87023
published_at 2026-04-01T12:55:00Z
1
value 0.03236
scoring_system epss
scoring_elements 0.87034
published_at 2026-04-02T12:55:00Z
2
value 0.03236
scoring_system epss
scoring_elements 0.87053
published_at 2026-04-04T12:55:00Z
3
value 0.03236
scoring_system epss
scoring_elements 0.87046
published_at 2026-04-07T12:55:00Z
4
value 0.03236
scoring_system epss
scoring_elements 0.87066
published_at 2026-04-08T12:55:00Z
5
value 0.03236
scoring_system epss
scoring_elements 0.87074
published_at 2026-04-09T12:55:00Z
6
value 0.03236
scoring_system epss
scoring_elements 0.87087
published_at 2026-04-11T12:55:00Z
7
value 0.03236
scoring_system epss
scoring_elements 0.87082
published_at 2026-04-12T12:55:00Z
8
value 0.03236
scoring_system epss
scoring_elements 0.87076
published_at 2026-04-13T12:55:00Z
9
value 0.03236
scoring_system epss
scoring_elements 0.87092
published_at 2026-04-16T12:55:00Z
10
value 0.03236
scoring_system epss
scoring_elements 0.87096
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1889
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=508738
reference_id 508738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=508738
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535790
reference_id 535790
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535790
5
reference_url https://security.gentoo.org/glsa/200910-02
reference_id GLSA-200910-02
reference_type
scores
url https://security.gentoo.org/glsa/200910-02
6
reference_url https://access.redhat.com/errata/RHSA-2009:1139
reference_id RHSA-2009:1139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1139
7
reference_url https://usn.ubuntu.com/796-1/
reference_id USN-796-1
reference_type
scores
url https://usn.ubuntu.com/796-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.5.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.5.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-1889
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g8q8-pb2g-qfct
44
url VCID-gmc8-mf63-x7fs
vulnerability_id VCID-gmc8-mf63-x7fs
summary pidgin: Crash in IRC protocol plug-in by listing set of users (/who command) upon session startup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2943.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2943.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2943
reference_id
reference_type
scores
0
value 0.03955
scoring_system epss
scoring_elements 0.88302
published_at 2026-04-01T12:55:00Z
1
value 0.03955
scoring_system epss
scoring_elements 0.8831
published_at 2026-04-02T12:55:00Z
2
value 0.03955
scoring_system epss
scoring_elements 0.88325
published_at 2026-04-04T12:55:00Z
3
value 0.03955
scoring_system epss
scoring_elements 0.8833
published_at 2026-04-07T12:55:00Z
4
value 0.03955
scoring_system epss
scoring_elements 0.88349
published_at 2026-04-08T12:55:00Z
5
value 0.03955
scoring_system epss
scoring_elements 0.88355
published_at 2026-04-09T12:55:00Z
6
value 0.03955
scoring_system epss
scoring_elements 0.88366
published_at 2026-04-11T12:55:00Z
7
value 0.03955
scoring_system epss
scoring_elements 0.88358
published_at 2026-04-13T12:55:00Z
8
value 0.03955
scoring_system epss
scoring_elements 0.88373
published_at 2026-04-16T12:55:00Z
9
value 0.03955
scoring_system epss
scoring_elements 0.8837
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2943
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2943
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638709
reference_id 638709
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638709
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=722939
reference_id 722939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=722939
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2011-2943
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmc8-mf63-x7fs
45
url VCID-j7ap-11qk-ufeb
vulnerability_id VCID-j7ap-11qk-ufeb
summary
Multiple vulnerabilities have been discovered in Pidgin, leading to the
    remote execution of arbitrary code, unauthorized information disclosure, or
    Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2694.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2694
reference_id
reference_type
scores
0
value 0.34712
scoring_system epss
scoring_elements 0.96983
published_at 2026-04-01T12:55:00Z
1
value 0.34712
scoring_system epss
scoring_elements 0.96991
published_at 2026-04-02T12:55:00Z
2
value 0.34712
scoring_system epss
scoring_elements 0.96995
published_at 2026-04-04T12:55:00Z
3
value 0.34712
scoring_system epss
scoring_elements 0.96996
published_at 2026-04-07T12:55:00Z
4
value 0.34712
scoring_system epss
scoring_elements 0.97006
published_at 2026-04-08T12:55:00Z
5
value 0.34712
scoring_system epss
scoring_elements 0.97007
published_at 2026-04-09T12:55:00Z
6
value 0.34712
scoring_system epss
scoring_elements 0.9701
published_at 2026-04-11T12:55:00Z
7
value 0.34712
scoring_system epss
scoring_elements 0.97011
published_at 2026-04-12T12:55:00Z
8
value 0.34712
scoring_system epss
scoring_elements 0.97012
published_at 2026-04-13T12:55:00Z
9
value 0.34712
scoring_system epss
scoring_elements 0.97021
published_at 2026-04-16T12:55:00Z
10
value 0.34712
scoring_system epss
scoring_elements 0.97024
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=514957
reference_id 514957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=514957
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542486
reference_id 542486
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542486
5
reference_url https://security.gentoo.org/glsa/200910-02
reference_id GLSA-200910-02
reference_type
scores
url https://security.gentoo.org/glsa/200910-02
6
reference_url https://access.redhat.com/errata/RHSA-2009:1218
reference_id RHSA-2009:1218
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1218
7
reference_url https://usn.ubuntu.com/820-1/
reference_id USN-820-1
reference_type
scores
url https://usn.ubuntu.com/820-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.5.9-1?distro=trixie
purl pkg:deb/debian/pidgin@2.5.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.9-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-2694
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7ap-11qk-ufeb
46
url VCID-jb3a-ydyh-sfft
vulnerability_id VCID-jb3a-ydyh-sfft
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6479.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6479
reference_id
reference_type
scores
0
value 0.00683
scoring_system epss
scoring_elements 0.71584
published_at 2026-04-01T12:55:00Z
1
value 0.00683
scoring_system epss
scoring_elements 0.71591
published_at 2026-04-02T12:55:00Z
2
value 0.00683
scoring_system epss
scoring_elements 0.71609
published_at 2026-04-04T12:55:00Z
3
value 0.00683
scoring_system epss
scoring_elements 0.71582
published_at 2026-04-07T12:55:00Z
4
value 0.00683
scoring_system epss
scoring_elements 0.71622
published_at 2026-04-08T12:55:00Z
5
value 0.00683
scoring_system epss
scoring_elements 0.71632
published_at 2026-04-09T12:55:00Z
6
value 0.00683
scoring_system epss
scoring_elements 0.71656
published_at 2026-04-11T12:55:00Z
7
value 0.00683
scoring_system epss
scoring_elements 0.7164
published_at 2026-04-12T12:55:00Z
8
value 0.00683
scoring_system epss
scoring_elements 0.71621
published_at 2026-04-13T12:55:00Z
9
value 0.00683
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-16T12:55:00Z
10
value 0.00683
scoring_system epss
scoring_elements 0.7167
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1056907
reference_id 1056907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1056907
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6479
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jb3a-ydyh-sfft
47
url VCID-jrfq-eubr-hfa9
vulnerability_id VCID-jrfq-eubr-hfa9
summary The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3084.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3084
reference_id
reference_type
scores
0
value 0.01382
scoring_system epss
scoring_elements 0.80243
published_at 2026-04-01T12:55:00Z
1
value 0.01382
scoring_system epss
scoring_elements 0.8025
published_at 2026-04-02T12:55:00Z
2
value 0.01382
scoring_system epss
scoring_elements 0.8027
published_at 2026-04-04T12:55:00Z
3
value 0.01382
scoring_system epss
scoring_elements 0.80259
published_at 2026-04-07T12:55:00Z
4
value 0.01382
scoring_system epss
scoring_elements 0.80286
published_at 2026-04-08T12:55:00Z
5
value 0.01382
scoring_system epss
scoring_elements 0.80296
published_at 2026-04-09T12:55:00Z
6
value 0.01382
scoring_system epss
scoring_elements 0.80315
published_at 2026-04-11T12:55:00Z
7
value 0.01382
scoring_system epss
scoring_elements 0.803
published_at 2026-04-12T12:55:00Z
8
value 0.01382
scoring_system epss
scoring_elements 0.80294
published_at 2026-04-13T12:55:00Z
9
value 0.01382
scoring_system epss
scoring_elements 0.80324
published_at 2026-04-16T12:55:00Z
10
value 0.01382
scoring_system epss
scoring_elements 0.80326
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.2-1?distro=trixie
purl pkg:deb/debian/pidgin@2.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-3084
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrfq-eubr-hfa9
48
url VCID-ksp5-2txt-vucn
vulnerability_id VCID-ksp5-2txt-vucn
summary
Multiple vulnerabilities in Pidgin might allow for the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1375.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1375.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1375
reference_id
reference_type
scores
0
value 0.05278
scoring_system epss
scoring_elements 0.89962
published_at 2026-04-01T12:55:00Z
1
value 0.05278
scoring_system epss
scoring_elements 0.89964
published_at 2026-04-02T12:55:00Z
2
value 0.05278
scoring_system epss
scoring_elements 0.89977
published_at 2026-04-04T12:55:00Z
3
value 0.05278
scoring_system epss
scoring_elements 0.89983
published_at 2026-04-07T12:55:00Z
4
value 0.05278
scoring_system epss
scoring_elements 0.89998
published_at 2026-04-08T12:55:00Z
5
value 0.05278
scoring_system epss
scoring_elements 0.90004
published_at 2026-04-13T12:55:00Z
6
value 0.05278
scoring_system epss
scoring_elements 0.90012
published_at 2026-04-11T12:55:00Z
7
value 0.05278
scoring_system epss
scoring_elements 0.9001
published_at 2026-04-12T12:55:00Z
8
value 0.05278
scoring_system epss
scoring_elements 0.90019
published_at 2026-04-16T12:55:00Z
9
value 0.05278
scoring_system epss
scoring_elements 0.9002
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1375
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=500491
reference_id 500491
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=500491
4
reference_url https://security.gentoo.org/glsa/200905-07
reference_id GLSA-200905-07
reference_type
scores
url https://security.gentoo.org/glsa/200905-07
5
reference_url https://access.redhat.com/errata/RHSA-2009:1060
reference_id RHSA-2009:1060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1060
6
reference_url https://usn.ubuntu.com/781-1/
reference_id USN-781-1
reference_type
scores
url https://usn.ubuntu.com/781-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.5.6-1?distro=trixie
purl pkg:deb/debian/pidgin@2.5.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-1375
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksp5-2txt-vucn
49
url VCID-kt42-hfwm-7ubh
vulnerability_id VCID-kt42-hfwm-7ubh
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2365
reference_id
reference_type
scores
0
value 0.03252
scoring_system epss
scoring_elements 0.87069
published_at 2026-04-01T12:55:00Z
1
value 0.03252
scoring_system epss
scoring_elements 0.8708
published_at 2026-04-02T12:55:00Z
2
value 0.03252
scoring_system epss
scoring_elements 0.87098
published_at 2026-04-04T12:55:00Z
3
value 0.03252
scoring_system epss
scoring_elements 0.87091
published_at 2026-04-07T12:55:00Z
4
value 0.03252
scoring_system epss
scoring_elements 0.87112
published_at 2026-04-08T12:55:00Z
5
value 0.03252
scoring_system epss
scoring_elements 0.87119
published_at 2026-04-09T12:55:00Z
6
value 0.03252
scoring_system epss
scoring_elements 0.87132
published_at 2026-04-11T12:55:00Z
7
value 0.03252
scoring_system epss
scoring_elements 0.87127
published_at 2026-04-12T12:55:00Z
8
value 0.03252
scoring_system epss
scoring_elements 0.87122
published_at 2026-04-13T12:55:00Z
9
value 0.03252
scoring_system epss
scoring_elements 0.87138
published_at 2026-04-16T12:55:00Z
10
value 0.03252
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348858
reference_id 1348858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348858
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2365
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kt42-hfwm-7ubh
50
url VCID-mhjx-yrdy-5qf6
vulnerability_id VCID-mhjx-yrdy-5qf6
summary pidgin: NULL pointer dereference in the XMPP protocol plug-in by renaming user name
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4939.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4939.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4939
reference_id
reference_type
scores
0
value 0.01102
scoring_system epss
scoring_elements 0.78007
published_at 2026-04-01T12:55:00Z
1
value 0.01102
scoring_system epss
scoring_elements 0.78014
published_at 2026-04-02T12:55:00Z
2
value 0.01102
scoring_system epss
scoring_elements 0.78043
published_at 2026-04-04T12:55:00Z
3
value 0.01102
scoring_system epss
scoring_elements 0.78026
published_at 2026-04-07T12:55:00Z
4
value 0.01102
scoring_system epss
scoring_elements 0.78052
published_at 2026-04-08T12:55:00Z
5
value 0.01102
scoring_system epss
scoring_elements 0.78057
published_at 2026-04-09T12:55:00Z
6
value 0.01102
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-11T12:55:00Z
7
value 0.01102
scoring_system epss
scoring_elements 0.78066
published_at 2026-04-12T12:55:00Z
8
value 0.01102
scoring_system epss
scoring_elements 0.78062
published_at 2026-04-13T12:55:00Z
9
value 0.01102
scoring_system epss
scoring_elements 0.78097
published_at 2026-04-16T12:55:00Z
10
value 0.01102
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4939
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4939
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664028
reference_id 664028
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664028
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=803296
reference_id 803296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=803296
5
reference_url https://usn.ubuntu.com/1500-1/
reference_id USN-1500-1
reference_type
scores
url https://usn.ubuntu.com/1500-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.2-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2011-4939
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mhjx-yrdy-5qf6
51
url VCID-mjen-7k79-vyd4
vulnerability_id VCID-mjen-7k79-vyd4
summary gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3185
reference_id
reference_type
scores
0
value 0.05087
scoring_system epss
scoring_elements 0.89769
published_at 2026-04-01T12:55:00Z
1
value 0.05087
scoring_system epss
scoring_elements 0.89771
published_at 2026-04-02T12:55:00Z
2
value 0.05087
scoring_system epss
scoring_elements 0.89786
published_at 2026-04-04T12:55:00Z
3
value 0.05087
scoring_system epss
scoring_elements 0.89789
published_at 2026-04-07T12:55:00Z
4
value 0.05087
scoring_system epss
scoring_elements 0.89807
published_at 2026-04-08T12:55:00Z
5
value 0.05087
scoring_system epss
scoring_elements 0.89813
published_at 2026-04-09T12:55:00Z
6
value 0.05087
scoring_system epss
scoring_elements 0.89819
published_at 2026-04-11T12:55:00Z
7
value 0.05087
scoring_system epss
scoring_elements 0.89818
published_at 2026-04-12T12:55:00Z
8
value 0.05087
scoring_system epss
scoring_elements 0.8981
published_at 2026-04-13T12:55:00Z
9
value 0.05087
scoring_system epss
scoring_elements 0.89824
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3185
fixed_packages
0
url pkg:deb/debian/pidgin@0?distro=trixie
purl pkg:deb/debian/pidgin@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@0%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2011-3185
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mjen-7k79-vyd4
52
url VCID-myh5-wcpe-zbac
vulnerability_id VCID-myh5-wcpe-zbac
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2372
reference_id
reference_type
scores
0
value 0.01217
scoring_system epss
scoring_elements 0.78988
published_at 2026-04-01T12:55:00Z
1
value 0.01217
scoring_system epss
scoring_elements 0.78994
published_at 2026-04-02T12:55:00Z
2
value 0.01217
scoring_system epss
scoring_elements 0.79021
published_at 2026-04-04T12:55:00Z
3
value 0.01217
scoring_system epss
scoring_elements 0.79005
published_at 2026-04-07T12:55:00Z
4
value 0.01217
scoring_system epss
scoring_elements 0.79029
published_at 2026-04-08T12:55:00Z
5
value 0.01217
scoring_system epss
scoring_elements 0.79036
published_at 2026-04-09T12:55:00Z
6
value 0.01217
scoring_system epss
scoring_elements 0.7906
published_at 2026-04-18T12:55:00Z
7
value 0.01217
scoring_system epss
scoring_elements 0.79045
published_at 2026-04-12T12:55:00Z
8
value 0.01217
scoring_system epss
scoring_elements 0.79035
published_at 2026-04-13T12:55:00Z
9
value 0.01217
scoring_system epss
scoring_elements 0.79063
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2372
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348876
reference_id 1348876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348876
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2372
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-myh5-wcpe-zbac
53
url VCID-nhj7-agfp-rue8
vulnerability_id VCID-nhj7-agfp-rue8
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2376
reference_id
reference_type
scores
0
value 0.06853
scoring_system epss
scoring_elements 0.91312
published_at 2026-04-01T12:55:00Z
1
value 0.06853
scoring_system epss
scoring_elements 0.91317
published_at 2026-04-02T12:55:00Z
2
value 0.06853
scoring_system epss
scoring_elements 0.91327
published_at 2026-04-04T12:55:00Z
3
value 0.06853
scoring_system epss
scoring_elements 0.91334
published_at 2026-04-07T12:55:00Z
4
value 0.06853
scoring_system epss
scoring_elements 0.91347
published_at 2026-04-08T12:55:00Z
5
value 0.06853
scoring_system epss
scoring_elements 0.91354
published_at 2026-04-09T12:55:00Z
6
value 0.06853
scoring_system epss
scoring_elements 0.9136
published_at 2026-04-11T12:55:00Z
7
value 0.06853
scoring_system epss
scoring_elements 0.91363
published_at 2026-04-13T12:55:00Z
8
value 0.06853
scoring_system epss
scoring_elements 0.91388
published_at 2026-04-16T12:55:00Z
9
value 0.06853
scoring_system epss
scoring_elements 0.91386
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2376
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348848
reference_id 1348848
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348848
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2376
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nhj7-agfp-rue8
54
url VCID-nvtc-a3b6-23bs
vulnerability_id VCID-nvtc-a3b6-23bs
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url http://hg.pidgin.im/pidgin/main/rev/ad7e7fb98db3
reference_id
reference_type
scores
url http://hg.pidgin.im/pidgin/main/rev/ad7e7fb98db3
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0274.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0274.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0274
reference_id
reference_type
scores
0
value 0.00474
scoring_system epss
scoring_elements 0.64807
published_at 2026-04-18T12:55:00Z
1
value 0.00474
scoring_system epss
scoring_elements 0.64675
published_at 2026-04-01T12:55:00Z
2
value 0.00474
scoring_system epss
scoring_elements 0.64727
published_at 2026-04-02T12:55:00Z
3
value 0.00474
scoring_system epss
scoring_elements 0.64755
published_at 2026-04-04T12:55:00Z
4
value 0.00474
scoring_system epss
scoring_elements 0.64717
published_at 2026-04-07T12:55:00Z
5
value 0.00474
scoring_system epss
scoring_elements 0.64765
published_at 2026-04-08T12:55:00Z
6
value 0.00474
scoring_system epss
scoring_elements 0.6478
published_at 2026-04-09T12:55:00Z
7
value 0.00474
scoring_system epss
scoring_elements 0.64797
published_at 2026-04-11T12:55:00Z
8
value 0.00474
scoring_system epss
scoring_elements 0.64786
published_at 2026-04-12T12:55:00Z
9
value 0.00474
scoring_system epss
scoring_elements 0.64758
published_at 2026-04-13T12:55:00Z
10
value 0.00474
scoring_system epss
scoring_elements 0.64796
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0274
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18221
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18221
8
reference_url http://www.pidgin.im/news/security/?id=68
reference_id
reference_type
scores
url http://www.pidgin.im/news/security/?id=68
9
reference_url http://www.ubuntu.com/usn/USN-1746-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1746-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=910042
reference_id 910042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=910042
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0274
reference_id CVE-2013-0274
reference_type
scores
0
value 2.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0274
63
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
64
reference_url https://access.redhat.com/errata/RHSA-2013:0646
reference_id RHSA-2013:0646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0646
65
reference_url https://usn.ubuntu.com/1746-1/
reference_id USN-1746-1
reference_type
scores
url https://usn.ubuntu.com/1746-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.6-3?distro=trixie
purl pkg:deb/debian/pidgin@2.10.6-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-0274
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nvtc-a3b6-23bs
55
url VCID-nxhy-m3bd-6qab
vulnerability_id VCID-nxhy-m3bd-6qab
summary security update
references
0
reference_url http://hg.pidgin.im/pidgin/main/rev/2e4475087f04
reference_id
reference_type
scores
url http://hg.pidgin.im/pidgin/main/rev/2e4475087f04
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
3
reference_url http://pidgin.im/news/security/?id=86
reference_id
reference_type
scores
url http://pidgin.im/news/security/?id=86
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3694.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3694.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3694
reference_id
reference_type
scores
0
value 0.0127
scoring_system epss
scoring_elements 0.79442
published_at 2026-04-01T12:55:00Z
1
value 0.0127
scoring_system epss
scoring_elements 0.79448
published_at 2026-04-02T12:55:00Z
2
value 0.0127
scoring_system epss
scoring_elements 0.79472
published_at 2026-04-04T12:55:00Z
3
value 0.0127
scoring_system epss
scoring_elements 0.79459
published_at 2026-04-07T12:55:00Z
4
value 0.0127
scoring_system epss
scoring_elements 0.79487
published_at 2026-04-08T12:55:00Z
5
value 0.0127
scoring_system epss
scoring_elements 0.79495
published_at 2026-04-09T12:55:00Z
6
value 0.0127
scoring_system epss
scoring_elements 0.79517
published_at 2026-04-11T12:55:00Z
7
value 0.0127
scoring_system epss
scoring_elements 0.795
published_at 2026-04-12T12:55:00Z
8
value 0.0127
scoring_system epss
scoring_elements 0.79491
published_at 2026-04-13T12:55:00Z
9
value 0.0127
scoring_system epss
scoring_elements 0.79521
published_at 2026-04-16T12:55:00Z
10
value 0.0127
scoring_system epss
scoring_elements 0.79518
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3694
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
10
reference_url http://secunia.com/advisories/60741
reference_id
reference_type
scores
url http://secunia.com/advisories/60741
11
reference_url http://secunia.com/advisories/61968
reference_id
reference_type
scores
url http://secunia.com/advisories/61968
12
reference_url http://www.debian.org/security/2014/dsa-3055
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3055
13
reference_url http://www.ubuntu.com/usn/USN-2390-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2390-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1154908
reference_id 1154908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1154908
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3694
reference_id CVE-2014-3694
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3694
33
reference_url https://access.redhat.com/errata/RHSA-2017:1854
reference_id RHSA-2017:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1854
34
reference_url https://usn.ubuntu.com/2390-1/
reference_id USN-2390-1
reference_type
scores
url https://usn.ubuntu.com/2390-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.10-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2014-3694
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxhy-m3bd-6qab
56
url VCID-p1gr-bcnk-pkg7
vulnerability_id VCID-p1gr-bcnk-pkg7
summary pidgin: ICQ X-Status denial of service (NULL deref)
references
0
reference_url http://developer.pidgin.im/viewmtn/revision/diff/fcb70f7c12120206d30ad33223ff85be7b226d1c/with/8e8ff246492e45af8f8d0808296d6f2906794dc0/libpurple/protocols/oscar/family_icbm.c
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/diff/fcb70f7c12120206d30ad33223ff85be7b226d1c/with/8e8ff246492e45af8f8d0808296d6f2906794dc0/libpurple/protocols/oscar/family_icbm.c
1
reference_url http://developer.pidgin.im/viewmtn/revision/info/8e8ff246492e45af8f8d0808296d6f2906794dc0
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/info/8e8ff246492e45af8f8d0808296d6f2906794dc0
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2528.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2528.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2528
reference_id
reference_type
scores
0
value 0.02081
scoring_system epss
scoring_elements 0.84015
published_at 2026-04-18T12:55:00Z
1
value 0.02081
scoring_system epss
scoring_elements 0.83921
published_at 2026-04-01T12:55:00Z
2
value 0.02081
scoring_system epss
scoring_elements 0.83935
published_at 2026-04-02T12:55:00Z
3
value 0.02081
scoring_system epss
scoring_elements 0.83951
published_at 2026-04-04T12:55:00Z
4
value 0.02081
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-07T12:55:00Z
5
value 0.02081
scoring_system epss
scoring_elements 0.83977
published_at 2026-04-08T12:55:00Z
6
value 0.02081
scoring_system epss
scoring_elements 0.83984
published_at 2026-04-09T12:55:00Z
7
value 0.02081
scoring_system epss
scoring_elements 0.83999
published_at 2026-04-11T12:55:00Z
8
value 0.02081
scoring_system epss
scoring_elements 0.83993
published_at 2026-04-12T12:55:00Z
9
value 0.02081
scoring_system epss
scoring_elements 0.83989
published_at 2026-04-13T12:55:00Z
10
value 0.02081
scoring_system epss
scoring_elements 0.84014
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2528
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2528
5
reference_url http://secunia.com/advisories/40699
reference_id
reference_type
scores
url http://secunia.com/advisories/40699
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/60566
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/60566
7
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462873
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462873
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18359
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18359
9
reference_url http://www.osvdb.org/66506
reference_id
reference_type
scores
url http://www.osvdb.org/66506
10
reference_url http://www.pidgin.im/news/security/index.php?id=47
reference_id
reference_type
scores
url http://www.pidgin.im/news/security/index.php?id=47
11
reference_url http://www.securityfocus.com/bid/41881
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/41881
12
reference_url http://www.vupen.com/english/advisories/2010/1887
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1887
13
reference_url http://www.vupen.com/english/advisories/2010/2221
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2221
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=617105
reference_id 617105
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=617105
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2528
reference_id CVE-2010-2528
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2528
fixed_packages
0
url pkg:deb/debian/pidgin@2.7.2-1?distro=trixie
purl pkg:deb/debian/pidgin@2.7.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2010-2528
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1gr-bcnk-pkg7
57
url VCID-p8dm-3wjm-8bgd
vulnerability_id VCID-p8dm-3wjm-8bgd
summary Pidgin: NULL pointer dereference by processing a custom smiley (DoS)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3085.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3085
reference_id
reference_type
scores
0
value 0.00949
scoring_system epss
scoring_elements 0.76294
published_at 2026-04-01T12:55:00Z
1
value 0.00949
scoring_system epss
scoring_elements 0.76298
published_at 2026-04-02T12:55:00Z
2
value 0.00949
scoring_system epss
scoring_elements 0.76328
published_at 2026-04-04T12:55:00Z
3
value 0.00949
scoring_system epss
scoring_elements 0.76307
published_at 2026-04-07T12:55:00Z
4
value 0.00949
scoring_system epss
scoring_elements 0.7634
published_at 2026-04-08T12:55:00Z
5
value 0.00949
scoring_system epss
scoring_elements 0.76354
published_at 2026-04-09T12:55:00Z
6
value 0.00949
scoring_system epss
scoring_elements 0.7638
published_at 2026-04-11T12:55:00Z
7
value 0.00949
scoring_system epss
scoring_elements 0.76358
published_at 2026-04-12T12:55:00Z
8
value 0.00949
scoring_system epss
scoring_elements 0.76353
published_at 2026-04-13T12:55:00Z
9
value 0.00949
scoring_system epss
scoring_elements 0.76394
published_at 2026-04-16T12:55:00Z
10
value 0.00949
scoring_system epss
scoring_elements 0.764
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3085
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521853
reference_id 521853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521853
4
reference_url https://access.redhat.com/errata/RHSA-2009:1453
reference_id RHSA-2009:1453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1453
5
reference_url https://usn.ubuntu.com/886-1/
reference_id USN-886-1
reference_type
scores
url https://usn.ubuntu.com/886-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.2-1?distro=trixie
purl pkg:deb/debian/pidgin@2.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-3085
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8dm-3wjm-8bgd
58
url VCID-q5v4-yz4d-yydy
vulnerability_id VCID-q5v4-yz4d-yydy
summary
A buffer overflow in Pidgin might allow remote attackers to execute
    arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3374.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3374
reference_id
reference_type
scores
0
value 0.04706
scoring_system epss
scoring_elements 0.89323
published_at 2026-04-01T12:55:00Z
1
value 0.04706
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-02T12:55:00Z
2
value 0.04706
scoring_system epss
scoring_elements 0.8934
published_at 2026-04-04T12:55:00Z
3
value 0.04706
scoring_system epss
scoring_elements 0.89342
published_at 2026-04-07T12:55:00Z
4
value 0.04706
scoring_system epss
scoring_elements 0.89359
published_at 2026-04-08T12:55:00Z
5
value 0.04706
scoring_system epss
scoring_elements 0.89363
published_at 2026-04-09T12:55:00Z
6
value 0.04706
scoring_system epss
scoring_elements 0.89372
published_at 2026-04-11T12:55:00Z
7
value 0.04706
scoring_system epss
scoring_elements 0.89369
published_at 2026-04-12T12:55:00Z
8
value 0.04706
scoring_system epss
scoring_elements 0.89365
published_at 2026-04-13T12:55:00Z
9
value 0.04706
scoring_system epss
scoring_elements 0.89381
published_at 2026-04-16T12:55:00Z
10
value 0.04706
scoring_system epss
scoring_elements 0.8938
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3374
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680661
reference_id 680661
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680661
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=837319
reference_id 837319
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=837319
5
reference_url https://security.gentoo.org/glsa/201209-17
reference_id GLSA-201209-17
reference_type
scores
url https://security.gentoo.org/glsa/201209-17
6
reference_url https://access.redhat.com/errata/RHSA-2012:1102
reference_id RHSA-2012:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1102
7
reference_url https://usn.ubuntu.com/1500-1/
reference_id USN-1500-1
reference_type
scores
url https://usn.ubuntu.com/1500-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.6-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2012-3374
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5v4-yz4d-yydy
59
url VCID-qhab-ydb4-b7gq
vulnerability_id VCID-qhab-ydb4-b7gq
summary
Multiple vulnerabilities have been discovered in Pidgin, allowing for
    remote arbitrary code execution, Denial of Service and service spoofing.
references
0
reference_url http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msnp9/slplink.c
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msnp9/slplink.c
1
reference_url http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msn/slplink.c
reference_id
reference_type
scores
url http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msn/slplink.c
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2927.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2927.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2927
reference_id
reference_type
scores
0
value 0.06329
scoring_system epss
scoring_elements 0.91003
published_at 2026-04-18T12:55:00Z
1
value 0.06329
scoring_system epss
scoring_elements 0.90929
published_at 2026-04-01T12:55:00Z
2
value 0.06329
scoring_system epss
scoring_elements 0.90934
published_at 2026-04-02T12:55:00Z
3
value 0.06329
scoring_system epss
scoring_elements 0.90943
published_at 2026-04-04T12:55:00Z
4
value 0.06329
scoring_system epss
scoring_elements 0.90954
published_at 2026-04-07T12:55:00Z
5
value 0.06329
scoring_system epss
scoring_elements 0.90965
published_at 2026-04-08T12:55:00Z
6
value 0.06329
scoring_system epss
scoring_elements 0.90971
published_at 2026-04-09T12:55:00Z
7
value 0.06329
scoring_system epss
scoring_elements 0.9098
published_at 2026-04-13T12:55:00Z
8
value 0.06329
scoring_system epss
scoring_elements 0.90981
published_at 2026-04-12T12:55:00Z
9
value 0.06329
scoring_system epss
scoring_elements 0.91005
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2927
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927
5
reference_url http://secunia.com/advisories/30971
reference_id
reference_type
scores
url http://secunia.com/advisories/30971
6
reference_url http://secunia.com/advisories/31016
reference_id
reference_type
scores
url http://secunia.com/advisories/31016
7
reference_url http://secunia.com/advisories/31105
reference_id
reference_type
scores
url http://secunia.com/advisories/31105
8
reference_url http://secunia.com/advisories/31387
reference_id
reference_type
scores
url http://secunia.com/advisories/31387
9
reference_url http://secunia.com/advisories/31642
reference_id
reference_type
scores
url http://secunia.com/advisories/31642
10
reference_url http://secunia.com/advisories/32859
reference_id
reference_type
scores
url http://secunia.com/advisories/32859
11
reference_url http://secunia.com/advisories/32861
reference_id
reference_type
scores
url http://secunia.com/advisories/32861
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44774
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44774
13
reference_url https://issues.rpath.com/browse/RPL-2647
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2647
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11695
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11695
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17972
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17972
16
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0246
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0246
17
reference_url http://www.debian.org/security/2008/dsa-1610
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1610
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:143
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:143
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:127
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:127
20
reference_url http://www.openwall.com/lists/oss-security/2008/07/03/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/07/03/6
21
reference_url http://www.openwall.com/lists/oss-security/2008/07/04/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/07/04/1
22
reference_url http://www.pidgin.im/news/security/?id=25
reference_id
reference_type
scores
url http://www.pidgin.im/news/security/?id=25
23
reference_url http://www.redhat.com/support/errata/RHSA-2008-0584.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0584.html
24
reference_url http://www.securityfocus.com/archive/1/493682
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493682
25
reference_url http://www.securityfocus.com/archive/1/495165/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495165/100/0/threaded
26
reference_url http://www.securityfocus.com/archive/1/495818/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495818/100/0/threaded
27
reference_url http://www.securityfocus.com/bid/29956
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29956
28
reference_url http://www.securitytracker.com/id?1020451
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020451
29
reference_url http://www.ubuntu.com/usn/USN-675-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-675-1
30
reference_url http://www.ubuntu.com/usn/USN-675-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-675-2
31
reference_url http://www.vupen.com/english/advisories/2008/2032/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2032/references
32
reference_url http://www.zerodayinitiative.com/advisories/ZDI-08-054
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-08-054
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=453764
reference_id 453764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=453764
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:adium:adium:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2927
reference_id CVE-2008-2927
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-2927
60
reference_url https://security.gentoo.org/glsa/200901-13
reference_id GLSA-200901-13
reference_type
scores
url https://security.gentoo.org/glsa/200901-13
61
reference_url https://access.redhat.com/errata/RHSA-2008:0584
reference_id RHSA-2008:0584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0584
62
reference_url https://usn.ubuntu.com/675-1/
reference_id USN-675-1
reference_type
scores
url https://usn.ubuntu.com/675-1/
63
reference_url https://usn.ubuntu.com/675-2/
reference_id USN-675-2
reference_type
scores
url https://usn.ubuntu.com/675-2/
fixed_packages
0
url pkg:deb/debian/pidgin@2.4.3-1?distro=trixie
purl pkg:deb/debian/pidgin@2.4.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2008-2927
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhab-ydb4-b7gq
60
url VCID-r5z8-wmea-a7by
vulnerability_id VCID-r5z8-wmea-a7by
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2378
reference_id
reference_type
scores
0
value 0.03306
scoring_system epss
scoring_elements 0.87187
published_at 2026-04-01T12:55:00Z
1
value 0.03306
scoring_system epss
scoring_elements 0.87197
published_at 2026-04-02T12:55:00Z
2
value 0.03306
scoring_system epss
scoring_elements 0.87214
published_at 2026-04-04T12:55:00Z
3
value 0.03306
scoring_system epss
scoring_elements 0.87211
published_at 2026-04-07T12:55:00Z
4
value 0.03306
scoring_system epss
scoring_elements 0.87231
published_at 2026-04-08T12:55:00Z
5
value 0.03306
scoring_system epss
scoring_elements 0.87238
published_at 2026-04-09T12:55:00Z
6
value 0.03306
scoring_system epss
scoring_elements 0.87251
published_at 2026-04-11T12:55:00Z
7
value 0.03306
scoring_system epss
scoring_elements 0.87245
published_at 2026-04-12T12:55:00Z
8
value 0.03306
scoring_system epss
scoring_elements 0.8724
published_at 2026-04-13T12:55:00Z
9
value 0.03306
scoring_system epss
scoring_elements 0.87255
published_at 2026-04-16T12:55:00Z
10
value 0.03306
scoring_system epss
scoring_elements 0.8726
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348854
reference_id 1348854
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348854
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2378
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r5z8-wmea-a7by
61
url VCID-rzq7-5psb-dygh
vulnerability_id VCID-rzq7-5psb-dygh
summary Pidgin: NULL pointer dereference by processing incomplete MSN SLP invite (DoS)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3083.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3083
reference_id
reference_type
scores
0
value 0.01284
scoring_system epss
scoring_elements 0.79556
published_at 2026-04-01T12:55:00Z
1
value 0.01284
scoring_system epss
scoring_elements 0.79562
published_at 2026-04-02T12:55:00Z
2
value 0.01284
scoring_system epss
scoring_elements 0.79585
published_at 2026-04-04T12:55:00Z
3
value 0.01284
scoring_system epss
scoring_elements 0.79572
published_at 2026-04-07T12:55:00Z
4
value 0.01284
scoring_system epss
scoring_elements 0.796
published_at 2026-04-08T12:55:00Z
5
value 0.01284
scoring_system epss
scoring_elements 0.79607
published_at 2026-04-09T12:55:00Z
6
value 0.01284
scoring_system epss
scoring_elements 0.79628
published_at 2026-04-11T12:55:00Z
7
value 0.01284
scoring_system epss
scoring_elements 0.79612
published_at 2026-04-12T12:55:00Z
8
value 0.01284
scoring_system epss
scoring_elements 0.79605
published_at 2026-04-13T12:55:00Z
9
value 0.01284
scoring_system epss
scoring_elements 0.79635
published_at 2026-04-16T12:55:00Z
10
value 0.01284
scoring_system epss
scoring_elements 0.79634
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521832
reference_id 521832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521832
4
reference_url https://access.redhat.com/errata/RHSA-2009:1453
reference_id RHSA-2009:1453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1453
5
reference_url https://access.redhat.com/errata/RHSA-2009:1535
reference_id RHSA-2009:1535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1535
6
reference_url https://usn.ubuntu.com/886-1/
reference_id USN-886-1
reference_type
scores
url https://usn.ubuntu.com/886-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.2-1?distro=trixie
purl pkg:deb/debian/pidgin@2.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-3083
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzq7-5psb-dygh
62
url VCID-s4gw-ntgc-5bad
vulnerability_id VCID-s4gw-ntgc-5bad
summary
Multiple vulnerabilities in Pidgin might allow for the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1374.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1374
reference_id
reference_type
scores
0
value 0.04458
scoring_system epss
scoring_elements 0.89021
published_at 2026-04-01T12:55:00Z
1
value 0.04458
scoring_system epss
scoring_elements 0.89029
published_at 2026-04-02T12:55:00Z
2
value 0.04458
scoring_system epss
scoring_elements 0.89045
published_at 2026-04-04T12:55:00Z
3
value 0.04458
scoring_system epss
scoring_elements 0.89046
published_at 2026-04-07T12:55:00Z
4
value 0.04458
scoring_system epss
scoring_elements 0.89064
published_at 2026-04-08T12:55:00Z
5
value 0.04458
scoring_system epss
scoring_elements 0.89069
published_at 2026-04-09T12:55:00Z
6
value 0.04458
scoring_system epss
scoring_elements 0.8908
published_at 2026-04-11T12:55:00Z
7
value 0.04458
scoring_system epss
scoring_elements 0.89076
published_at 2026-04-12T12:55:00Z
8
value 0.04458
scoring_system epss
scoring_elements 0.89074
published_at 2026-04-13T12:55:00Z
9
value 0.04458
scoring_system epss
scoring_elements 0.89088
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1374
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=500490
reference_id 500490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=500490
4
reference_url https://security.gentoo.org/glsa/200905-07
reference_id GLSA-200905-07
reference_type
scores
url https://security.gentoo.org/glsa/200905-07
5
reference_url https://access.redhat.com/errata/RHSA-2009:1060
reference_id RHSA-2009:1060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1060
6
reference_url https://usn.ubuntu.com/781-1/
reference_id USN-781-1
reference_type
scores
url https://usn.ubuntu.com/781-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.5.6-1?distro=trixie
purl pkg:deb/debian/pidgin@2.5.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-1374
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4gw-ntgc-5bad
63
url VCID-sap1-hcpz-a7dm
vulnerability_id VCID-sap1-hcpz-a7dm
summary libpurple in Pidgin 2.1.0 through 2.2.1, when using HTML logging, allows remote attackers to cause a denial of service (NULL dereference and application crash) via a message that contains invalid HTML data, a different vector than CVE-2007-4996.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4999.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4999.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4999
reference_id
reference_type
scores
0
value 0.01541
scoring_system epss
scoring_elements 0.81306
published_at 2026-04-01T12:55:00Z
1
value 0.01541
scoring_system epss
scoring_elements 0.81315
published_at 2026-04-02T12:55:00Z
2
value 0.01541
scoring_system epss
scoring_elements 0.81337
published_at 2026-04-04T12:55:00Z
3
value 0.01541
scoring_system epss
scoring_elements 0.81335
published_at 2026-04-07T12:55:00Z
4
value 0.01541
scoring_system epss
scoring_elements 0.81364
published_at 2026-04-08T12:55:00Z
5
value 0.01541
scoring_system epss
scoring_elements 0.81369
published_at 2026-04-13T12:55:00Z
6
value 0.01541
scoring_system epss
scoring_elements 0.81391
published_at 2026-04-11T12:55:00Z
7
value 0.01541
scoring_system epss
scoring_elements 0.81377
published_at 2026-04-12T12:55:00Z
8
value 0.01541
scoring_system epss
scoring_elements 0.81406
published_at 2026-04-16T12:55:00Z
9
value 0.01541
scoring_system epss
scoring_elements 0.81407
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4999
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4999
3
reference_url https://usn.ubuntu.com/548-1/
reference_id USN-548-1
reference_type
scores
url https://usn.ubuntu.com/548-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.2.2-1?distro=trixie
purl pkg:deb/debian/pidgin@2.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2007-4999
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sap1-hcpz-a7dm
64
url VCID-stg3-h3jz-wfa9
vulnerability_id VCID-stg3-h3jz-wfa9
summary MSN nudges sent from unknown buddies can cause libpurple to crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4996.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4996
reference_id
reference_type
scores
0
value 0.0163
scoring_system epss
scoring_elements 0.81815
published_at 2026-04-01T12:55:00Z
1
value 0.0163
scoring_system epss
scoring_elements 0.81826
published_at 2026-04-02T12:55:00Z
2
value 0.0163
scoring_system epss
scoring_elements 0.81848
published_at 2026-04-04T12:55:00Z
3
value 0.0163
scoring_system epss
scoring_elements 0.81845
published_at 2026-04-07T12:55:00Z
4
value 0.0163
scoring_system epss
scoring_elements 0.81872
published_at 2026-04-08T12:55:00Z
5
value 0.0163
scoring_system epss
scoring_elements 0.81879
published_at 2026-04-09T12:55:00Z
6
value 0.0163
scoring_system epss
scoring_elements 0.81898
published_at 2026-04-11T12:55:00Z
7
value 0.0163
scoring_system epss
scoring_elements 0.81886
published_at 2026-04-12T12:55:00Z
8
value 0.0163
scoring_system epss
scoring_elements 0.81881
published_at 2026-04-13T12:55:00Z
9
value 0.0163
scoring_system epss
scoring_elements 0.81918
published_at 2026-04-16T12:55:00Z
10
value 0.0163
scoring_system epss
scoring_elements 0.81917
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4996
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4996
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=314451
reference_id 314451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=314451
fixed_packages
0
url pkg:deb/debian/pidgin@2.2.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.2.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.2.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2007-4996
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stg3-h3jz-wfa9
65
url VCID-stm8-xdkh-7bdf
vulnerability_id VCID-stm8-xdkh-7bdf
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6485.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6485
reference_id
reference_type
scores
0
value 0.00694
scoring_system epss
scoring_elements 0.71848
published_at 2026-04-07T12:55:00Z
1
value 0.00694
scoring_system epss
scoring_elements 0.71857
published_at 2026-04-02T12:55:00Z
2
value 0.00694
scoring_system epss
scoring_elements 0.71876
published_at 2026-04-04T12:55:00Z
3
value 0.00694
scoring_system epss
scoring_elements 0.71887
published_at 2026-04-13T12:55:00Z
4
value 0.00694
scoring_system epss
scoring_elements 0.71898
published_at 2026-04-09T12:55:00Z
5
value 0.00694
scoring_system epss
scoring_elements 0.71922
published_at 2026-04-11T12:55:00Z
6
value 0.00694
scoring_system epss
scoring_elements 0.71904
published_at 2026-04-12T12:55:00Z
7
value 0.00694
scoring_system epss
scoring_elements 0.71929
published_at 2026-04-16T12:55:00Z
8
value 0.00694
scoring_system epss
scoring_elements 0.71934
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6485
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1057484
reference_id 1057484
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1057484
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6485
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stm8-xdkh-7bdf
66
url VCID-tsth-71zg-n3g7
vulnerability_id VCID-tsth-71zg-n3g7
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6489.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6489.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6489
reference_id
reference_type
scores
0
value 0.00756
scoring_system epss
scoring_elements 0.73213
published_at 2026-04-01T12:55:00Z
1
value 0.00756
scoring_system epss
scoring_elements 0.73223
published_at 2026-04-02T12:55:00Z
2
value 0.00756
scoring_system epss
scoring_elements 0.73244
published_at 2026-04-04T12:55:00Z
3
value 0.00756
scoring_system epss
scoring_elements 0.73217
published_at 2026-04-07T12:55:00Z
4
value 0.00756
scoring_system epss
scoring_elements 0.73253
published_at 2026-04-08T12:55:00Z
5
value 0.00756
scoring_system epss
scoring_elements 0.73267
published_at 2026-04-09T12:55:00Z
6
value 0.00756
scoring_system epss
scoring_elements 0.73292
published_at 2026-04-11T12:55:00Z
7
value 0.00756
scoring_system epss
scoring_elements 0.73272
published_at 2026-04-12T12:55:00Z
8
value 0.00756
scoring_system epss
scoring_elements 0.73265
published_at 2026-04-13T12:55:00Z
9
value 0.00756
scoring_system epss
scoring_elements 0.73308
published_at 2026-04-16T12:55:00Z
10
value 0.00756
scoring_system epss
scoring_elements 0.73316
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6489
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1057490
reference_id 1057490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1057490
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6489
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsth-71zg-n3g7
67
url VCID-ua4g-zzrd-eyhb
vulnerability_id VCID-ua4g-zzrd-eyhb
summary
Multiple vulnerabilities in Pidgin might allow for the remote execution of
    arbitrary code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1373.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1373
reference_id
reference_type
scores
0
value 0.0836
scoring_system epss
scoring_elements 0.92264
published_at 2026-04-01T12:55:00Z
1
value 0.0836
scoring_system epss
scoring_elements 0.92271
published_at 2026-04-02T12:55:00Z
2
value 0.0836
scoring_system epss
scoring_elements 0.92277
published_at 2026-04-04T12:55:00Z
3
value 0.0836
scoring_system epss
scoring_elements 0.92279
published_at 2026-04-07T12:55:00Z
4
value 0.0836
scoring_system epss
scoring_elements 0.92291
published_at 2026-04-08T12:55:00Z
5
value 0.0836
scoring_system epss
scoring_elements 0.92295
published_at 2026-04-09T12:55:00Z
6
value 0.0836
scoring_system epss
scoring_elements 0.923
published_at 2026-04-13T12:55:00Z
7
value 0.0836
scoring_system epss
scoring_elements 0.92301
published_at 2026-04-12T12:55:00Z
8
value 0.0836
scoring_system epss
scoring_elements 0.92312
published_at 2026-04-16T12:55:00Z
9
value 0.0836
scoring_system epss
scoring_elements 0.92311
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=500488
reference_id 500488
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=500488
4
reference_url https://security.gentoo.org/glsa/200905-07
reference_id GLSA-200905-07
reference_type
scores
url https://security.gentoo.org/glsa/200905-07
5
reference_url https://access.redhat.com/errata/RHSA-2009:1059
reference_id RHSA-2009:1059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1059
6
reference_url https://access.redhat.com/errata/RHSA-2009:1060
reference_id RHSA-2009:1060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1060
7
reference_url https://usn.ubuntu.com/781-1/
reference_id USN-781-1
reference_type
scores
url https://usn.ubuntu.com/781-1/
8
reference_url https://usn.ubuntu.com/781-2/
reference_id USN-781-2
reference_type
scores
url https://usn.ubuntu.com/781-2/
fixed_packages
0
url pkg:deb/debian/pidgin@2.5.6-1?distro=trixie
purl pkg:deb/debian/pidgin@2.5.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-1373
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ua4g-zzrd-eyhb
68
url VCID-uf3q-52zp-p3bk
vulnerability_id VCID-uf3q-52zp-p3bk
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2377
reference_id
reference_type
scores
0
value 0.03306
scoring_system epss
scoring_elements 0.87187
published_at 2026-04-01T12:55:00Z
1
value 0.03306
scoring_system epss
scoring_elements 0.87197
published_at 2026-04-02T12:55:00Z
2
value 0.03306
scoring_system epss
scoring_elements 0.87214
published_at 2026-04-04T12:55:00Z
3
value 0.03306
scoring_system epss
scoring_elements 0.87211
published_at 2026-04-07T12:55:00Z
4
value 0.03306
scoring_system epss
scoring_elements 0.87231
published_at 2026-04-08T12:55:00Z
5
value 0.03306
scoring_system epss
scoring_elements 0.87238
published_at 2026-04-09T12:55:00Z
6
value 0.03306
scoring_system epss
scoring_elements 0.87251
published_at 2026-04-11T12:55:00Z
7
value 0.03306
scoring_system epss
scoring_elements 0.87245
published_at 2026-04-12T12:55:00Z
8
value 0.03306
scoring_system epss
scoring_elements 0.8724
published_at 2026-04-13T12:55:00Z
9
value 0.03306
scoring_system epss
scoring_elements 0.87255
published_at 2026-04-16T12:55:00Z
10
value 0.03306
scoring_system epss
scoring_elements 0.8726
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348852
reference_id 1348852
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348852
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2377
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uf3q-52zp-p3bk
69
url VCID-vc51-jjp7-v7gb
vulnerability_id VCID-vc51-jjp7-v7gb
summary pidgin MSN protocol plugin memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0277.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0277
reference_id
reference_type
scores
0
value 0.08804
scoring_system epss
scoring_elements 0.92488
published_at 2026-04-01T12:55:00Z
1
value 0.08804
scoring_system epss
scoring_elements 0.92493
published_at 2026-04-02T12:55:00Z
2
value 0.08804
scoring_system epss
scoring_elements 0.92502
published_at 2026-04-04T12:55:00Z
3
value 0.08804
scoring_system epss
scoring_elements 0.92504
published_at 2026-04-07T12:55:00Z
4
value 0.08804
scoring_system epss
scoring_elements 0.92516
published_at 2026-04-08T12:55:00Z
5
value 0.08804
scoring_system epss
scoring_elements 0.92521
published_at 2026-04-09T12:55:00Z
6
value 0.08804
scoring_system epss
scoring_elements 0.92527
published_at 2026-04-13T12:55:00Z
7
value 0.08804
scoring_system epss
scoring_elements 0.92528
published_at 2026-04-12T12:55:00Z
8
value 0.08804
scoring_system epss
scoring_elements 0.92538
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=554335
reference_id 554335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=554335
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566775
reference_id 566775
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566775
5
reference_url https://access.redhat.com/errata/RHSA-2010:0115
reference_id RHSA-2010:0115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0115
6
reference_url https://usn.ubuntu.com/902-1/
reference_id USN-902-1
reference_type
scores
url https://usn.ubuntu.com/902-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.6-1?distro=trixie
purl pkg:deb/debian/pidgin@2.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2010-0277
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vc51-jjp7-v7gb
70
url VCID-vczt-sf85-uyfc
vulnerability_id VCID-vczt-sf85-uyfc
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1000030
reference_id
reference_type
scores
0
value 0.00738
scoring_system epss
scoring_elements 0.729
published_at 2026-04-18T12:55:00Z
1
value 0.00738
scoring_system epss
scoring_elements 0.72792
published_at 2026-04-01T12:55:00Z
2
value 0.00738
scoring_system epss
scoring_elements 0.72799
published_at 2026-04-02T12:55:00Z
3
value 0.00738
scoring_system epss
scoring_elements 0.72819
published_at 2026-04-04T12:55:00Z
4
value 0.00738
scoring_system epss
scoring_elements 0.72795
published_at 2026-04-07T12:55:00Z
5
value 0.00738
scoring_system epss
scoring_elements 0.72834
published_at 2026-04-08T12:55:00Z
6
value 0.00738
scoring_system epss
scoring_elements 0.72848
published_at 2026-04-13T12:55:00Z
7
value 0.00738
scoring_system epss
scoring_elements 0.72872
published_at 2026-04-11T12:55:00Z
8
value 0.00738
scoring_system epss
scoring_elements 0.72855
published_at 2026-04-12T12:55:00Z
9
value 0.00738
scoring_system epss
scoring_elements 0.7289
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1000030
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348882
reference_id 1348882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348882
5
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-1000030
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vczt-sf85-uyfc
71
url VCID-vmjg-nj4a-8uby
vulnerability_id VCID-vmjg-nj4a-8uby
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4323
reference_id
reference_type
scores
0
value 0.01998
scoring_system epss
scoring_elements 0.83581
published_at 2026-04-01T12:55:00Z
1
value 0.01998
scoring_system epss
scoring_elements 0.83594
published_at 2026-04-02T12:55:00Z
2
value 0.01998
scoring_system epss
scoring_elements 0.83608
published_at 2026-04-04T12:55:00Z
3
value 0.01998
scoring_system epss
scoring_elements 0.8361
published_at 2026-04-07T12:55:00Z
4
value 0.01998
scoring_system epss
scoring_elements 0.83634
published_at 2026-04-08T12:55:00Z
5
value 0.01998
scoring_system epss
scoring_elements 0.83642
published_at 2026-04-09T12:55:00Z
6
value 0.01998
scoring_system epss
scoring_elements 0.83658
published_at 2026-04-11T12:55:00Z
7
value 0.01998
scoring_system epss
scoring_elements 0.83652
published_at 2026-04-12T12:55:00Z
8
value 0.01998
scoring_system epss
scoring_elements 0.83647
published_at 2026-04-13T12:55:00Z
9
value 0.01998
scoring_system epss
scoring_elements 0.83682
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4323
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348857
reference_id 1348857
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348857
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-4323
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vmjg-nj4a-8uby
72
url VCID-vu3h-hcpa-8ubp
vulnerability_id VCID-vu3h-hcpa-8ubp
summary Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.
references
0
reference_url http://hg.pidgin.im/pidgin/main/rev/68b8eb10977f
reference_id
reference_type
scores
url http://hg.pidgin.im/pidgin/main/rev/68b8eb10977f
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html
3
reference_url http://pidgin.im/news/security/?id=89
reference_id
reference_type
scores
url http://pidgin.im/news/security/?id=89
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3697
reference_id
reference_type
scores
0
value 0.01028
scoring_system epss
scoring_elements 0.77333
published_at 2026-04-18T12:55:00Z
1
value 0.01028
scoring_system epss
scoring_elements 0.77233
published_at 2026-04-01T12:55:00Z
2
value 0.01028
scoring_system epss
scoring_elements 0.7724
published_at 2026-04-02T12:55:00Z
3
value 0.01028
scoring_system epss
scoring_elements 0.77268
published_at 2026-04-04T12:55:00Z
4
value 0.01028
scoring_system epss
scoring_elements 0.7725
published_at 2026-04-07T12:55:00Z
5
value 0.01028
scoring_system epss
scoring_elements 0.77281
published_at 2026-04-08T12:55:00Z
6
value 0.01028
scoring_system epss
scoring_elements 0.77289
published_at 2026-04-09T12:55:00Z
7
value 0.01028
scoring_system epss
scoring_elements 0.77317
published_at 2026-04-11T12:55:00Z
8
value 0.01028
scoring_system epss
scoring_elements 0.77296
published_at 2026-04-12T12:55:00Z
9
value 0.01028
scoring_system epss
scoring_elements 0.77294
published_at 2026-04-13T12:55:00Z
10
value 0.01028
scoring_system epss
scoring_elements 0.77334
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3697
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3697
reference_id CVE-2014-3697
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3697
fixed_packages
0
url pkg:deb/debian/pidgin@0?distro=trixie
purl pkg:deb/debian/pidgin@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@0%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2014-3697
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu3h-hcpa-8ubp
73
url VCID-whc9-ffhd-j3b6
vulnerability_id VCID-whc9-ffhd-j3b6
summary pidgin: Client abort in the MSN protocol plug-in by attempt to display certain, not UTF-8 encoded text
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1178.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1178
reference_id
reference_type
scores
0
value 0.01136
scoring_system epss
scoring_elements 0.78319
published_at 2026-04-01T12:55:00Z
1
value 0.01136
scoring_system epss
scoring_elements 0.78326
published_at 2026-04-02T12:55:00Z
2
value 0.01136
scoring_system epss
scoring_elements 0.78357
published_at 2026-04-04T12:55:00Z
3
value 0.01136
scoring_system epss
scoring_elements 0.78339
published_at 2026-04-07T12:55:00Z
4
value 0.01136
scoring_system epss
scoring_elements 0.78366
published_at 2026-04-08T12:55:00Z
5
value 0.01136
scoring_system epss
scoring_elements 0.78372
published_at 2026-04-09T12:55:00Z
6
value 0.01136
scoring_system epss
scoring_elements 0.78398
published_at 2026-04-11T12:55:00Z
7
value 0.01136
scoring_system epss
scoring_elements 0.7838
published_at 2026-04-12T12:55:00Z
8
value 0.01136
scoring_system epss
scoring_elements 0.78373
published_at 2026-04-13T12:55:00Z
9
value 0.01136
scoring_system epss
scoring_elements 0.78402
published_at 2026-04-16T12:55:00Z
10
value 0.01136
scoring_system epss
scoring_elements 0.78401
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1178
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664030
reference_id 664030
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664030
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=803298
reference_id 803298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=803298
5
reference_url https://access.redhat.com/errata/RHSA-2012:1102
reference_id RHSA-2012:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1102
6
reference_url https://usn.ubuntu.com/1500-1/
reference_id USN-1500-1
reference_type
scores
url https://usn.ubuntu.com/1500-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.2-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.2-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2012-1178
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whc9-ffhd-j3b6
74
url VCID-wprn-gtbj-ukgf
vulnerability_id VCID-wprn-gtbj-ukgf
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6478.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6478
reference_id
reference_type
scores
0
value 0.03105
scoring_system epss
scoring_elements 0.86751
published_at 2026-04-01T12:55:00Z
1
value 0.03105
scoring_system epss
scoring_elements 0.86762
published_at 2026-04-02T12:55:00Z
2
value 0.03105
scoring_system epss
scoring_elements 0.86781
published_at 2026-04-04T12:55:00Z
3
value 0.03105
scoring_system epss
scoring_elements 0.86778
published_at 2026-04-07T12:55:00Z
4
value 0.03105
scoring_system epss
scoring_elements 0.86798
published_at 2026-04-08T12:55:00Z
5
value 0.03105
scoring_system epss
scoring_elements 0.86807
published_at 2026-04-09T12:55:00Z
6
value 0.03105
scoring_system epss
scoring_elements 0.8682
published_at 2026-04-11T12:55:00Z
7
value 0.03105
scoring_system epss
scoring_elements 0.86816
published_at 2026-04-12T12:55:00Z
8
value 0.03105
scoring_system epss
scoring_elements 0.86812
published_at 2026-04-13T12:55:00Z
9
value 0.03105
scoring_system epss
scoring_elements 0.86828
published_at 2026-04-16T12:55:00Z
10
value 0.03105
scoring_system epss
scoring_elements 0.86832
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6478
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1056904
reference_id 1056904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1056904
15
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
16
reference_url https://access.redhat.com/errata/RHSA-2014:0139
reference_id RHSA-2014:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0139
17
reference_url https://usn.ubuntu.com/2100-1/
reference_id USN-2100-1
reference_type
scores
url https://usn.ubuntu.com/2100-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
purl pkg:deb/debian/pidgin@2.10.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-6478
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wprn-gtbj-ukgf
75
url VCID-x5c5-b5s8-bbe1
vulnerability_id VCID-x5c5-b5s8-bbe1
summary Unspecified vulnerability in Pidgin 2.6.0 allows remote attackers to cause a denial of service (crash) via a link in a Yahoo IM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3025.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3025.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3025
reference_id
reference_type
scores
0
value 0.00686
scoring_system epss
scoring_elements 0.71659
published_at 2026-04-01T12:55:00Z
1
value 0.00686
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-02T12:55:00Z
2
value 0.00686
scoring_system epss
scoring_elements 0.71683
published_at 2026-04-04T12:55:00Z
3
value 0.00686
scoring_system epss
scoring_elements 0.71656
published_at 2026-04-07T12:55:00Z
4
value 0.00686
scoring_system epss
scoring_elements 0.71696
published_at 2026-04-13T12:55:00Z
5
value 0.00686
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-09T12:55:00Z
6
value 0.00686
scoring_system epss
scoring_elements 0.7173
published_at 2026-04-11T12:55:00Z
7
value 0.00686
scoring_system epss
scoring_elements 0.71714
published_at 2026-04-12T12:55:00Z
8
value 0.00686
scoring_system epss
scoring_elements 0.7174
published_at 2026-04-16T12:55:00Z
9
value 0.00686
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3025
fixed_packages
0
url pkg:deb/debian/pidgin@2.6.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.1-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-3025
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5c5-b5s8-bbe1
76
url VCID-xekx-jf8h-93hy
vulnerability_id VCID-xekx-jf8h-93hy
summary Cipher API information disclosure in pidgin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4922.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4922
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29153
published_at 2026-04-01T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29224
published_at 2026-04-02T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29276
published_at 2026-04-04T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29091
published_at 2026-04-07T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29154
published_at 2026-04-08T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29196
published_at 2026-04-09T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29202
published_at 2026-04-11T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29156
published_at 2026-04-12T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29103
published_at 2026-04-13T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29129
published_at 2026-04-16T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.29106
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4922
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4922
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=684685
reference_id 684685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=684685
4
reference_url https://access.redhat.com/errata/RHSA-2011:0616
reference_id RHSA-2011:0616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0616
5
reference_url https://usn.ubuntu.com/1500-1/
reference_id USN-1500-1
reference_type
scores
url https://usn.ubuntu.com/1500-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.7.11-1?distro=trixie
purl pkg:deb/debian/pidgin@2.7.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.11-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2011-4922
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xekx-jf8h-93hy
77
url VCID-xgfd-ykfk-33dh
vulnerability_id VCID-xgfd-ykfk-33dh
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2373
reference_id
reference_type
scores
0
value 0.01953
scoring_system epss
scoring_elements 0.83407
published_at 2026-04-01T12:55:00Z
1
value 0.01953
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-02T12:55:00Z
2
value 0.01953
scoring_system epss
scoring_elements 0.83435
published_at 2026-04-04T12:55:00Z
3
value 0.01953
scoring_system epss
scoring_elements 0.83434
published_at 2026-04-07T12:55:00Z
4
value 0.01953
scoring_system epss
scoring_elements 0.83458
published_at 2026-04-08T12:55:00Z
5
value 0.01953
scoring_system epss
scoring_elements 0.83468
published_at 2026-04-09T12:55:00Z
6
value 0.01953
scoring_system epss
scoring_elements 0.83482
published_at 2026-04-11T12:55:00Z
7
value 0.01953
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-12T12:55:00Z
8
value 0.01953
scoring_system epss
scoring_elements 0.83471
published_at 2026-04-13T12:55:00Z
9
value 0.01953
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-16T12:55:00Z
10
value 0.01953
scoring_system epss
scoring_elements 0.83509
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348877
reference_id 1348877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348877
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2373
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xgfd-ykfk-33dh
78
url VCID-y3ke-yqy2-bbey
vulnerability_id VCID-y3ke-yqy2-bbey
summary
Multiple vulnerabilities in Pidgin may allow execution of arbitrary
    code.
references
0
reference_url http://hg.pidgin.im/pidgin/main/rev/a8aef1d340f2
reference_id
reference_type
scores
url http://hg.pidgin.im/pidgin/main/rev/a8aef1d340f2
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0271.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0271.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0271
reference_id
reference_type
scores
0
value 0.00556
scoring_system epss
scoring_elements 0.68197
published_at 2026-04-18T12:55:00Z
1
value 0.00556
scoring_system epss
scoring_elements 0.68084
published_at 2026-04-01T12:55:00Z
2
value 0.00556
scoring_system epss
scoring_elements 0.68107
published_at 2026-04-02T12:55:00Z
3
value 0.00556
scoring_system epss
scoring_elements 0.68125
published_at 2026-04-04T12:55:00Z
4
value 0.00556
scoring_system epss
scoring_elements 0.68102
published_at 2026-04-07T12:55:00Z
5
value 0.00556
scoring_system epss
scoring_elements 0.68154
published_at 2026-04-08T12:55:00Z
6
value 0.00556
scoring_system epss
scoring_elements 0.68169
published_at 2026-04-09T12:55:00Z
7
value 0.00556
scoring_system epss
scoring_elements 0.68194
published_at 2026-04-11T12:55:00Z
8
value 0.00556
scoring_system epss
scoring_elements 0.6818
published_at 2026-04-12T12:55:00Z
9
value 0.00556
scoring_system epss
scoring_elements 0.68147
published_at 2026-04-13T12:55:00Z
10
value 0.00556
scoring_system epss
scoring_elements 0.68185
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0271
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18386
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18386
7
reference_url http://www.pidgin.im/news/security/?id=65
reference_id
reference_type
scores
url http://www.pidgin.im/news/security/?id=65
8
reference_url http://www.ubuntu.com/usn/USN-1746-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1746-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=910039
reference_id 910039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=910039
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0271
reference_id CVE-2013-0271
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0271
62
reference_url https://security.gentoo.org/glsa/201405-22
reference_id GLSA-201405-22
reference_type
scores
url https://security.gentoo.org/glsa/201405-22
63
reference_url https://usn.ubuntu.com/1746-1/
reference_id USN-1746-1
reference_type
scores
url https://usn.ubuntu.com/1746-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.10.6-3?distro=trixie
purl pkg:deb/debian/pidgin@2.10.6-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2013-0271
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y3ke-yqy2-bbey
79
url VCID-ym5e-f9a1-ufdz
vulnerability_id VCID-ym5e-f9a1-ufdz
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2369
reference_id
reference_type
scores
0
value 0.03252
scoring_system epss
scoring_elements 0.87069
published_at 2026-04-01T12:55:00Z
1
value 0.03252
scoring_system epss
scoring_elements 0.8708
published_at 2026-04-02T12:55:00Z
2
value 0.03252
scoring_system epss
scoring_elements 0.87098
published_at 2026-04-04T12:55:00Z
3
value 0.03252
scoring_system epss
scoring_elements 0.87091
published_at 2026-04-07T12:55:00Z
4
value 0.03252
scoring_system epss
scoring_elements 0.87112
published_at 2026-04-08T12:55:00Z
5
value 0.03252
scoring_system epss
scoring_elements 0.87119
published_at 2026-04-09T12:55:00Z
6
value 0.03252
scoring_system epss
scoring_elements 0.87132
published_at 2026-04-11T12:55:00Z
7
value 0.03252
scoring_system epss
scoring_elements 0.87127
published_at 2026-04-12T12:55:00Z
8
value 0.03252
scoring_system epss
scoring_elements 0.87122
published_at 2026-04-13T12:55:00Z
9
value 0.03252
scoring_system epss
scoring_elements 0.87138
published_at 2026-04-16T12:55:00Z
10
value 0.03252
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2369
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348869
reference_id 1348869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348869
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2369
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ym5e-f9a1-ufdz
80
url VCID-ypkz-jxvb-9fgd
vulnerability_id VCID-ypkz-jxvb-9fgd
summary
Multiple vulnerabilities have been discovered in Pidgin, leading to the
    remote execution of arbitrary code, unauthorized information disclosure, or
    Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1376.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1376
reference_id
reference_type
scores
0
value 0.25885
scoring_system epss
scoring_elements 0.96229
published_at 2026-04-01T12:55:00Z
1
value 0.25885
scoring_system epss
scoring_elements 0.96237
published_at 2026-04-02T12:55:00Z
2
value 0.25885
scoring_system epss
scoring_elements 0.96244
published_at 2026-04-04T12:55:00Z
3
value 0.25885
scoring_system epss
scoring_elements 0.96248
published_at 2026-04-07T12:55:00Z
4
value 0.25885
scoring_system epss
scoring_elements 0.96257
published_at 2026-04-08T12:55:00Z
5
value 0.25885
scoring_system epss
scoring_elements 0.9626
published_at 2026-04-09T12:55:00Z
6
value 0.25885
scoring_system epss
scoring_elements 0.96265
published_at 2026-04-11T12:55:00Z
7
value 0.25885
scoring_system epss
scoring_elements 0.96264
published_at 2026-04-12T12:55:00Z
8
value 0.25885
scoring_system epss
scoring_elements 0.96267
published_at 2026-04-13T12:55:00Z
9
value 0.25885
scoring_system epss
scoring_elements 0.96276
published_at 2026-04-16T12:55:00Z
10
value 0.25885
scoring_system epss
scoring_elements 0.96281
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1376
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=500493
reference_id 500493
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=500493
4
reference_url https://security.gentoo.org/glsa/200905-07
reference_id GLSA-200905-07
reference_type
scores
url https://security.gentoo.org/glsa/200905-07
5
reference_url https://security.gentoo.org/glsa/200910-02
reference_id GLSA-200910-02
reference_type
scores
url https://security.gentoo.org/glsa/200910-02
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/9615.jar
reference_id OSVDB-54647;CVE-2009-2694;CVE-2009-1376
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/9615.jar
7
reference_url https://access.redhat.com/errata/RHSA-2009:1059
reference_id RHSA-2009:1059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1059
8
reference_url https://access.redhat.com/errata/RHSA-2009:1060
reference_id RHSA-2009:1060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1060
9
reference_url https://usn.ubuntu.com/781-1/
reference_id USN-781-1
reference_type
scores
url https://usn.ubuntu.com/781-1/
10
reference_url https://usn.ubuntu.com/781-2/
reference_id USN-781-2
reference_type
scores
url https://usn.ubuntu.com/781-2/
11
reference_url https://usn.ubuntu.com/886-1/
reference_id USN-886-1
reference_type
scores
url https://usn.ubuntu.com/886-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.5.6-1?distro=trixie
purl pkg:deb/debian/pidgin@2.5.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2009-1376
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ypkz-jxvb-9fgd
81
url VCID-zamj-2ej2-qke5
vulnerability_id VCID-zamj-2ej2-qke5
summary
Multiple vulnerabilities have been found in Pidgin, the worst of
    which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2366
reference_id
reference_type
scores
0
value 0.01953
scoring_system epss
scoring_elements 0.83407
published_at 2026-04-01T12:55:00Z
1
value 0.01953
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-02T12:55:00Z
2
value 0.01953
scoring_system epss
scoring_elements 0.83435
published_at 2026-04-04T12:55:00Z
3
value 0.01953
scoring_system epss
scoring_elements 0.83434
published_at 2026-04-07T12:55:00Z
4
value 0.01953
scoring_system epss
scoring_elements 0.83458
published_at 2026-04-08T12:55:00Z
5
value 0.01953
scoring_system epss
scoring_elements 0.83468
published_at 2026-04-09T12:55:00Z
6
value 0.01953
scoring_system epss
scoring_elements 0.83482
published_at 2026-04-11T12:55:00Z
7
value 0.01953
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-12T12:55:00Z
8
value 0.01953
scoring_system epss
scoring_elements 0.83471
published_at 2026-04-13T12:55:00Z
9
value 0.01953
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-16T12:55:00Z
10
value 0.01953
scoring_system epss
scoring_elements 0.83509
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1348862
reference_id 1348862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1348862
20
reference_url https://security.gentoo.org/glsa/201701-38
reference_id GLSA-201701-38
reference_type
scores
url https://security.gentoo.org/glsa/201701-38
21
reference_url https://usn.ubuntu.com/3031-1/
reference_id USN-3031-1
reference_type
scores
url https://usn.ubuntu.com/3031-1/
fixed_packages
0
url pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
purl pkg:deb/debian/pidgin@2.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2016-2366
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zamj-2ej2-qke5
82
url VCID-zhu6-8jrm-73bc
vulnerability_id VCID-zhu6-8jrm-73bc
summary pidgin: MITM attack possible on non-DNSSEC XMPP connections
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26491.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26491
reference_id
reference_type
scores
0
value 0.01204
scoring_system epss
scoring_elements 0.78896
published_at 2026-04-02T12:55:00Z
1
value 0.01204
scoring_system epss
scoring_elements 0.78925
published_at 2026-04-04T12:55:00Z
2
value 0.01204
scoring_system epss
scoring_elements 0.78908
published_at 2026-04-07T12:55:00Z
3
value 0.01204
scoring_system epss
scoring_elements 0.78932
published_at 2026-04-08T12:55:00Z
4
value 0.01204
scoring_system epss
scoring_elements 0.78938
published_at 2026-04-09T12:55:00Z
5
value 0.01204
scoring_system epss
scoring_elements 0.78962
published_at 2026-04-11T12:55:00Z
6
value 0.01204
scoring_system epss
scoring_elements 0.78947
published_at 2026-04-12T12:55:00Z
7
value 0.01204
scoring_system epss
scoring_elements 0.78937
published_at 2026-04-13T12:55:00Z
8
value 0.01204
scoring_system epss
scoring_elements 0.78966
published_at 2026-04-16T12:55:00Z
9
value 0.01204
scoring_system epss
scoring_elements 0.78963
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26491
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2081227
reference_id 2081227
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2081227
fixed_packages
0
url pkg:deb/debian/pidgin@2.14.9-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.9-1%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
aliases CVE-2022-26491
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu6-8jrm-73bc
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie