Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-ftdp-6cub-sqah
Vulnerability ID VCID-ftdp-6cub-sqah
Aliases CVE-2010-1624
Summary Pidgin: MSN SLP emoticon DoS (NULL pointer dereference)
Status Published
Exploitability 0.5
Weighted Severity 4.5
Risk 2.2
Affected and Fixed Packages Package Details
Weaknesses (2)
Reference id Reference type URL
http://developer.pidgin.im/viewmtn/revision/diff/884d44222e8c81ecec51c25e07d005e002a5479b/with/894460d22c434e73d60b71ec031611988e687c8b/libpurple/protocols/msn/slp.c
http://developer.pidgin.im/viewmtn/revision/info/894460d22c434e73d60b71ec031611988e687c8b
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1624.json
https://api.first.org/data/v1/epss?cve=CVE-2010-1624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624
http://secunia.com/advisories/39801
http://secunia.com/advisories/41899
https://exchange.xforce.ibmcloud.com/vulnerabilities/58559
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18547
http://www.mandriva.com/security/advisories?name=MDVSA-2010:097
http://www.pidgin.im/news/security/index.php?id=46
http://www.redhat.com/support/errata/RHSA-2010-0788.html
http://www.securityfocus.com/bid/40138
http://www.ubuntu.com/usn/USN-1014-1
http://www.vupen.com/english/advisories/2010/1141
http://www.vupen.com/english/advisories/2010/2755
589973 https://bugzilla.redhat.com/show_bug.cgi?id=589973
cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
CVE-2010-1624 https://nvd.nist.gov/vuln/detail/CVE-2010-1624
RHSA-2010:0788 https://access.redhat.com/errata/RHSA-2010:0788
USN-1014-1 https://usn.ubuntu.com/1014-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2010-1624
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.86734
EPSS Score 0.03095
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T14:57:15.176639+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1624.json 38.0.0