{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","type":"deb","namespace":"debian","name":"pidgin","version":"2.12.0-1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.14.12-1","latest_non_vulnerable_version":"2.14.12-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57364?format=json","vulnerability_id":"VCID-7fz8-kr7a-xqfb","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2368","reference_id":"","reference_type":"","scores":[{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90671","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90676","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90686","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90712","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90721","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90737","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90734","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90745","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.9074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90757","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348867","reference_id":"1348867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348867"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2368"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7fz8-kr7a-xqfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57371?format=json","vulnerability_id":"VCID-7u2r-rnyz-uyd5","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2375","reference_id":"","reference_type":"","scores":[{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65102","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65152","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65143","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65193","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65223","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65225","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65237","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65217","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348880","reference_id":"1348880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348880"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2375"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7u2r-rnyz-uyd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57376?format=json","vulnerability_id":"VCID-83az-td85-sudb","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2380","reference_id":"","reference_type":"","scores":[{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67335","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67371","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67393","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67437","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67459","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67446","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67449","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67461","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67441","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.6747","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67444","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348856","reference_id":"1348856","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348856"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2380"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-83az-td85-sudb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57363?format=json","vulnerability_id":"VCID-9btk-pnjv-1qgb","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2367","reference_id":"","reference_type":"","scores":[{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83389","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83402","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.8344","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.8345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83454","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83489","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83491","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83493","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83515","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83522","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83524","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83549","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348865","reference_id":"1348865","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348865"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2367"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9btk-pnjv-1qgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57366?format=json","vulnerability_id":"VCID-9npz-w7g5-r3b5","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2370","reference_id":"","reference_type":"","scores":[{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83407","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8342","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83482","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83476","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83471","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8351","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83567","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348871","reference_id":"1348871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348871"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2370"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9npz-w7g5-r3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57367?format=json","vulnerability_id":"VCID-ca59-9ma2-nyek","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2371","reference_id":"","reference_type":"","scores":[{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.8759","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87636","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.8766","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87661","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87658","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87675","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87682","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87681","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87696","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348873","reference_id":"1348873","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348873"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2371"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ca59-9ma2-nyek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57370?format=json","vulnerability_id":"VCID-cd64-6y6b-rfa3","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2374","reference_id":"","reference_type":"","scores":[{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86048","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86072","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.8607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.8608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.8611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86129","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348878","reference_id":"1348878","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348878"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2374"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cd64-6y6b-rfa3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37785?format=json","vulnerability_id":"VCID-cmm5-mw5m-bud2","summary":"A vulnerability in Pidgin might allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2640.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2640","reference_id":"","reference_type":"","scores":[{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72743","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72746","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72755","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.7275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72651","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76335","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00952","scoring_system":"epss","scoring_elements":"0.76331","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1430019","reference_id":"1430019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1430019"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859159","reference_id":"859159","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859159"},{"reference_url":"https://security.archlinux.org/ASA-201703-18","reference_id":"ASA-201703-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201703-18"},{"reference_url":"https://security.archlinux.org/AVG-226","reference_id":"AVG-226","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-226"},{"reference_url":"https://security.gentoo.org/glsa/201706-10","reference_id":"GLSA-201706-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1854","reference_id":"RHSA-2017:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1854"},{"reference_url":"https://usn.ubuntu.com/3231-1/","reference_id":"USN-3231-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3231-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2017-2640"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmm5-mw5m-bud2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57361?format=json","vulnerability_id":"VCID-kt42-hfwm-7ubh","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2365","reference_id":"","reference_type":"","scores":[{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87069","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.8708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87119","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87122","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87138","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87143","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87164","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87165","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87185","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348858","reference_id":"1348858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348858"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2365"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kt42-hfwm-7ubh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57368?format=json","vulnerability_id":"VCID-myh5-wcpe-zbac","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2372","reference_id":"","reference_type":"","scores":[{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.78988","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.78994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79021","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79005","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79029","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.7906","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79045","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79035","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79058","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79091","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79112","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79124","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348876","reference_id":"1348876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348876"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2372"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-myh5-wcpe-zbac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57372?format=json","vulnerability_id":"VCID-nhj7-agfp-rue8","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2376","reference_id":"","reference_type":"","scores":[{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91312","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91317","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91327","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91334","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.9136","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91363","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91386","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91397","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91395","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91409","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348848","reference_id":"1348848","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348848"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2376"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nhj7-agfp-rue8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57374?format=json","vulnerability_id":"VCID-r5z8-wmea-a7by","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2378","reference_id":"","reference_type":"","scores":[{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87187","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.8724","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.8726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87253","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87278","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87299","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348854","reference_id":"1348854","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348854"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2378"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r5z8-wmea-a7by"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57373?format=json","vulnerability_id":"VCID-uf3q-52zp-p3bk","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2377","reference_id":"","reference_type":"","scores":[{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87187","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.8724","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.8726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87253","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87278","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87299","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348852","reference_id":"1348852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348852"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2377"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uf3q-52zp-p3bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57360?format=json","vulnerability_id":"VCID-vczt-sf85-uyfc","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1000030","reference_id":"","reference_type":"","scores":[{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72936","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72792","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72819","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72795","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72848","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.7289","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72893","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72934","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72944","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72941","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1000030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348882","reference_id":"1348882","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348882"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-1000030"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vczt-sf85-uyfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57377?format=json","vulnerability_id":"VCID-vmjg-nj4a-8uby","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4323","reference_id":"","reference_type":"","scores":[{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83581","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.8361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83634","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83642","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83652","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83682","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83683","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83707","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83715","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.8372","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83743","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348857","reference_id":"1348857","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348857"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-4323"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vmjg-nj4a-8uby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57369?format=json","vulnerability_id":"VCID-xgfd-ykfk-33dh","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2373","reference_id":"","reference_type":"","scores":[{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83407","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8342","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83482","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83476","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83471","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8351","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83567","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348877","reference_id":"1348877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348877"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2373"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xgfd-ykfk-33dh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57365?format=json","vulnerability_id":"VCID-ym5e-f9a1-ufdz","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2369","reference_id":"","reference_type":"","scores":[{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87069","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.8708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87119","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87122","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87138","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87143","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87164","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87165","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87185","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348869","reference_id":"1348869","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348869"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2369"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ym5e-f9a1-ufdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57362?format=json","vulnerability_id":"VCID-zamj-2ej2-qke5","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2366","reference_id":"","reference_type":"","scores":[{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83407","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8342","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83482","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83476","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83471","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8351","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83567","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348862","reference_id":"1348862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348862"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035616?format=json","purl":"pkg:deb/debian/pidgin@2.11.0-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7fz8-kr7a-xqfb"},{"vulnerability":"VCID-7u2r-rnyz-uyd5"},{"vulnerability":"VCID-83az-td85-sudb"},{"vulnerability":"VCID-9btk-pnjv-1qgb"},{"vulnerability":"VCID-9npz-w7g5-r3b5"},{"vulnerability":"VCID-ca59-9ma2-nyek"},{"vulnerability":"VCID-cd64-6y6b-rfa3"},{"vulnerability":"VCID-cmm5-mw5m-bud2"},{"vulnerability":"VCID-kt42-hfwm-7ubh"},{"vulnerability":"VCID-myh5-wcpe-zbac"},{"vulnerability":"VCID-nhj7-agfp-rue8"},{"vulnerability":"VCID-r5z8-wmea-a7by"},{"vulnerability":"VCID-uf3q-52zp-p3bk"},{"vulnerability":"VCID-vczt-sf85-uyfc"},{"vulnerability":"VCID-vmjg-nj4a-8uby"},{"vulnerability":"VCID-xgfd-ykfk-33dh"},{"vulnerability":"VCID-ym5e-f9a1-ufdz"},{"vulnerability":"VCID-zamj-2ej2-qke5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-0%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049224?format=json","purl":"pkg:deb/debian/pidgin@2.12.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}],"aliases":["CVE-2016-2366"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zamj-2ej2-qke5"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1"}