{"url":"http://public2.vulnerablecode.io/api/packages/126668?format=json","purl":"pkg:rpm/redhat/pidgin@2.6.6-5.el5_7?arch=1","type":"rpm","namespace":"redhat","name":"pidgin","version":"2.6.6-5.el5_7","qualifiers":{"arch":"1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38816?format=json","vulnerability_id":"VCID-3m4a-pw2r-zkfb","summary":"Multiple vulnerabilities were found in Pidgin, the worst of which\n    allowing for the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3594.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3594","reference_id":"","reference_type":"","scores":[{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76409","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76451","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76465","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76464","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76505","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76496","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.7653","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76536","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76549","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00959","scoring_system":"epss","scoring_elements":"0.76538","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=743481","reference_id":"743481","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=743481"},{"reference_url":"https://security.gentoo.org/glsa/201206-11","reference_id":"GLSA-201206-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201206-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1371","reference_id":"RHSA-2011:1371","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1371"},{"reference_url":"https://usn.ubuntu.com/1273-1/","reference_id":"USN-1273-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1273-1/"}],"fixed_packages":[],"aliases":["CVE-2011-3594"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3m4a-pw2r-zkfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87457?format=json","vulnerability_id":"VCID-71bq-9kpe-wbc8","summary":"Pidgin: Multiple NULL pointer dereference flaws in Yahoo protocol plug-in","references":[{"reference_url":"http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c","reference_id":"","reference_type":"","scores":[],"url":"http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c"},{"reference_url":"http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7","reference_id":"","reference_type":"","scores":[],"url":"http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1091.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1091.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1091","reference_id":"","reference_type":"","scores":[{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81135","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.80984","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.80993","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81043","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.8105","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81054","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81047","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81084","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81085","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81105","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81112","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01489","scoring_system":"epss","scoring_elements":"0.81121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091"},{"reference_url":"http://secunia.com/advisories/43695","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43695"},{"reference_url":"http://secunia.com/advisories/43721","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43721"},{"reference_url":"http://secunia.com/advisories/46376","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46376"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66055","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66055"},{"reference_url":"https://hermes.opensuse.org/messages/13195955","reference_id":"","reference_type":"","scores":[],"url":"https://hermes.opensuse.org/messages/13195955"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402"},{"reference_url":"http://www.pidgin.im/news/security/?id=51","reference_id":"","reference_type":"","scores":[],"url":"http://www.pidgin.im/news/security/?id=51"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0616.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0616.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1371.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-1371.html"},{"reference_url":"http://www.securityfocus.com/bid/46837","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46837"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0643","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0643"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0661","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0661"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0669","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0669"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0703","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0703"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=683031","reference_id":"683031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=683031"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1091","reference_id":"CVE-2011-1091","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0616","reference_id":"RHSA-2011:0616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1371","reference_id":"RHSA-2011:1371","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1371"},{"reference_url":"https://usn.ubuntu.com/1273-1/","reference_id":"USN-1273-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1273-1/"}],"fixed_packages":[],"aliases":["CVE-2011-1091"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-71bq-9kpe-wbc8"}],"fixing_vulnerabilities":[],"risk_score":"1.8","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/pidgin@2.6.6-5.el5_7%3Farch=1"}