Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-9hw9-a9yt-p7fv
Summary
Multiple vulnerabilities have been discovered in Pidgin, allowing for
    remote arbitrary code execution, Denial of Service and service spoofing.
Aliases
0
alias CVE-2008-2957
Fixed_packages
0
url pkg:deb/debian/pidgin@2.4.3-4?distro=trixie
purl pkg:deb/debian/pidgin@2.4.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-4%3Fdistro=trixie
1
url pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zhu6-8jrm-73bc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie
2
url pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie
3
url pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
purl pkg:deb/debian/pidgin@2.14.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie
4
url pkg:ebuild/net-im/pidgin@2.5.1
purl pkg:ebuild/net-im/pidgin@2.5.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.5.1
Affected_packages
0
url pkg:rpm/redhat/pidgin@2.5.2-6?arch=el5
purl pkg:rpm/redhat/pidgin@2.5.2-6?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9hw9-a9yt-p7fv
1
vulnerability VCID-9sg6-dv5z-sbfq
2
vulnerability VCID-ag3e-ee6x-tbcv
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/pidgin@2.5.2-6%3Farch=el5
1
url pkg:rpm/redhat/pidgin@2.5.2-6?arch=el4
purl pkg:rpm/redhat/pidgin@2.5.2-6?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9hw9-a9yt-p7fv
1
vulnerability VCID-9sg6-dv5z-sbfq
2
vulnerability VCID-ag3e-ee6x-tbcv
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/pidgin@2.5.2-6%3Farch=el4
References
0
reference_url http://crisp.cs.du.edu/?q=ca2007-1
reference_id
reference_type
scores
url http://crisp.cs.du.edu/?q=ca2007-1
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2957.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2957.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2957
reference_id
reference_type
scores
0
value 0.01709
scoring_system epss
scoring_elements 0.82367
published_at 2026-04-21T12:55:00Z
1
value 0.01709
scoring_system epss
scoring_elements 0.8226
published_at 2026-04-01T12:55:00Z
2
value 0.01709
scoring_system epss
scoring_elements 0.82273
published_at 2026-04-02T12:55:00Z
3
value 0.01709
scoring_system epss
scoring_elements 0.82293
published_at 2026-04-04T12:55:00Z
4
value 0.01709
scoring_system epss
scoring_elements 0.82287
published_at 2026-04-07T12:55:00Z
5
value 0.01709
scoring_system epss
scoring_elements 0.82314
published_at 2026-04-08T12:55:00Z
6
value 0.01709
scoring_system epss
scoring_elements 0.82321
published_at 2026-04-09T12:55:00Z
7
value 0.01709
scoring_system epss
scoring_elements 0.82341
published_at 2026-04-11T12:55:00Z
8
value 0.01709
scoring_system epss
scoring_elements 0.82335
published_at 2026-04-12T12:55:00Z
9
value 0.01709
scoring_system epss
scoring_elements 0.82329
published_at 2026-04-13T12:55:00Z
10
value 0.01709
scoring_system epss
scoring_elements 0.82363
published_at 2026-04-16T12:55:00Z
11
value 0.01709
scoring_system epss
scoring_elements 0.82364
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2957
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957
4
reference_url http://secunia.com/advisories/32859
reference_id
reference_type
scores
url http://secunia.com/advisories/32859
5
reference_url http://secunia.com/advisories/33102
reference_id
reference_type
scores
url http://secunia.com/advisories/33102
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17599
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17599
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076
8
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:025
10
reference_url http://www.openwall.com/lists/oss-security/2008/06/27/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/06/27/3
11
reference_url http://www.redhat.com/support/errata/RHSA-2008-1023.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1023.html
12
reference_url http://www.securityfocus.com/bid/29985
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29985
13
reference_url http://www.ubuntu.com/usn/USN-675-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-675-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=453740
reference_id 453740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=453740
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632
reference_id 488632
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2957
reference_id CVE-2008-2957
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-2957
18
reference_url https://security.gentoo.org/glsa/200901-13
reference_id GLSA-200901-13
reference_type
scores
url https://security.gentoo.org/glsa/200901-13
19
reference_url https://access.redhat.com/errata/RHSA-2008:1023
reference_id RHSA-2008:1023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1023
20
reference_url https://usn.ubuntu.com/675-1/
reference_id USN-675-1
reference_type
scores
url https://usn.ubuntu.com/675-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score6.4 - 6.4
Exploitability0.5
Weighted_severity5.8
Risk_score2.9
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-9hw9-a9yt-p7fv