Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/pidgin@2.10.1-1?distro=trixie |
| Type | deb |
| Namespace | debian |
| Name | pidgin |
| Version | 2.10.1-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 2.10.2-1 |
| Latest_non_vulnerable_version | 2.14.14-1 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-13y4-t2b9-pkg9 |
| vulnerability_id |
VCID-13y4-t2b9-pkg9 |
| summary |
pidgin: SILC remote crash on channel messages |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4603 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78575 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78582 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78614 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78596 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78621 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78627 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78652 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78633 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78626 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78655 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.78653 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01165 |
| scoring_system |
epss |
| scoring_elements |
0.7865 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4603 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4603
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-13y4-t2b9-pkg9 |
|
| 1 |
| url |
VCID-1fmj-vjdg-g3eu |
| vulnerability_id |
VCID-1fmj-vjdg-g3eu |
| summary |
pidgin: Multiple NULL pointer deference flaws by processing certain Jingle stanzas in the XMPP protocol plug-in |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4602 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81272 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81281 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81303 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81301 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.8133 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81335 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81356 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81341 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81333 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81371 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81373 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01535 |
| scoring_system |
epss |
| scoring_elements |
0.81374 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4602 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4602
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1fmj-vjdg-g3eu |
|
| 2 |
| url |
VCID-3m4a-pw2r-zkfb |
| vulnerability_id |
VCID-3m4a-pw2r-zkfb |
| summary |
Multiple vulnerabilities were found in Pidgin, the worst of which
allowing for the remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3594 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76405 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76437 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76419 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76451 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76465 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76491 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76469 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76464 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76505 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76509 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00959 |
| scoring_system |
epss |
| scoring_elements |
0.76496 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3594 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3594
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3m4a-pw2r-zkfb |
|
| 3 |
| url |
VCID-ach7-fhrx-zqd3 |
| vulnerability_id |
VCID-ach7-fhrx-zqd3 |
| summary |
(libpurple): Invalid UTF-8 string handling in OSCAR messages |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4601 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88018 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88027 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88042 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88048 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88067 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88073 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88083 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88076 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88077 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.8809 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88088 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0379 |
| scoring_system |
epss |
| scoring_elements |
0.88087 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4601 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4601
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ach7-fhrx-zqd3 |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie |