{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","type":"ebuild","namespace":"net-im","name":"pidgin","version":"2.11.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.12.0","latest_non_vulnerable_version":"2.12.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57364?format=json","vulnerability_id":"VCID-7fz8-kr7a-xqfb","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2368","reference_id":"","reference_type":"","scores":[{"value":"0.0591","scoring_system":"epss","scoring_elements":"0.90704","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0591","scoring_system":"epss","scoring_elements":"0.90697","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90676","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90686","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90712","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90721","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90737","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90734","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90745","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.9074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90757","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90775","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90787","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90785","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90796","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06022","scoring_system":"epss","scoring_elements":"0.90671","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348867","reference_id":"1348867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348867"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2368"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7fz8-kr7a-xqfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57371?format=json","vulnerability_id":"VCID-7u2r-rnyz-uyd5","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2375","reference_id":"","reference_type":"","scores":[{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64887","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64878","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65152","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65143","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65193","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65223","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65225","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65237","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65217","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65264","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65309","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65278","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65299","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65102","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348880","reference_id":"1348880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348880"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2375"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7u2r-rnyz-uyd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57376?format=json","vulnerability_id":"VCID-83az-td85-sudb","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2380","reference_id":"","reference_type":"","scores":[{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67335","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67371","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67393","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67437","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67459","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67446","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67449","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67527","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67499","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67524","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67461","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67441","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.6747","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67488","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71716","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00678","scoring_system":"epss","scoring_elements":"0.71724","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348856","reference_id":"1348856","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348856"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2380"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-83az-td85-sudb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57363?format=json","vulnerability_id":"VCID-9btk-pnjv-1qgb","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2367","reference_id":"","reference_type":"","scores":[{"value":"0.0191","scoring_system":"epss","scoring_elements":"0.83491","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0191","scoring_system":"epss","scoring_elements":"0.8348","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83402","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.8344","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.8345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83454","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83489","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83491","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83493","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83515","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83522","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83524","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83549","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83571","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.8359","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83606","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01948","scoring_system":"epss","scoring_elements":"0.83389","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348865","reference_id":"1348865","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348865"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2367"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9btk-pnjv-1qgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57366?format=json","vulnerability_id":"VCID-9npz-w7g5-r3b5","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2370","reference_id":"","reference_type":"","scores":[{"value":"0.01915","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01915","scoring_system":"epss","scoring_elements":"0.83497","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8342","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83482","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83476","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83471","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8351","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83588","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83607","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83623","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83407","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348871","reference_id":"1348871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348871"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2370"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9npz-w7g5-r3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57367?format=json","vulnerability_id":"VCID-ca59-9ma2-nyek","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2371","reference_id":"","reference_type":"","scores":[{"value":"0.03453","scoring_system":"epss","scoring_elements":"0.87647","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03453","scoring_system":"epss","scoring_elements":"0.87638","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87636","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.8766","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87661","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87658","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87675","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87682","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87681","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87711","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87729","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87726","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.87739","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03521","scoring_system":"epss","scoring_elements":"0.8759","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348873","reference_id":"1348873","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348873"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2371"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ca59-9ma2-nyek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57370?format=json","vulnerability_id":"VCID-cd64-6y6b-rfa3","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2374","reference_id":"","reference_type":"","scores":[{"value":"0.02727","scoring_system":"epss","scoring_elements":"0.86109","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02727","scoring_system":"epss","scoring_elements":"0.86099","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86048","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86072","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.8607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.8608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.8611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86129","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86151","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86169","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86166","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86179","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02781","scoring_system":"epss","scoring_elements":"0.86001","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348878","reference_id":"1348878","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348878"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2374"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cd64-6y6b-rfa3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57361?format=json","vulnerability_id":"VCID-kt42-hfwm-7ubh","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2365","reference_id":"","reference_type":"","scores":[{"value":"0.03136","scoring_system":"epss","scoring_elements":"0.87027","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03136","scoring_system":"epss","scoring_elements":"0.87019","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.8708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87119","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87122","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87138","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87143","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87164","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87165","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87185","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87201","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.8722","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87215","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87231","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87069","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348858","reference_id":"1348858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348858"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2365"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kt42-hfwm-7ubh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57368?format=json","vulnerability_id":"VCID-myh5-wcpe-zbac","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2372","reference_id":"","reference_type":"","scores":[{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.78988","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.78994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79021","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79005","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79029","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.7906","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79045","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79035","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79162","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.7916","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79175","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79058","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79091","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79112","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79124","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01217","scoring_system":"epss","scoring_elements":"0.79145","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81553","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81549","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348876","reference_id":"1348876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348876"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2372"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-myh5-wcpe-zbac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57372?format=json","vulnerability_id":"VCID-nhj7-agfp-rue8","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2376","reference_id":"","reference_type":"","scores":[{"value":"0.06727","scoring_system":"epss","scoring_elements":"0.91365","published_at":"2026-05-15T12:55:00Z"},{"value":"0.06727","scoring_system":"epss","scoring_elements":"0.91359","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91317","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91327","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91334","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.9136","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91363","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91386","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91397","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91395","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91409","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91425","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91435","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91433","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91443","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06853","scoring_system":"epss","scoring_elements":"0.91312","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348848","reference_id":"1348848","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348848"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2376"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nhj7-agfp-rue8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57374?format=json","vulnerability_id":"VCID-r5z8-wmea-a7by","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2378","reference_id":"","reference_type":"","scores":[{"value":"0.03242","scoring_system":"epss","scoring_elements":"0.87257","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03242","scoring_system":"epss","scoring_elements":"0.87249","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.8724","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.8726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87253","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87278","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87299","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87311","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.8733","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87324","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87338","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87187","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348854","reference_id":"1348854","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348854"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2378"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r5z8-wmea-a7by"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57375?format=json","vulnerability_id":"VCID-tqpn-6ttw-9ffc","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2379.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2379.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2379","reference_id":"","reference_type":"","scores":[{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.3655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36239","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36149","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.3622","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36721","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36659","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36667","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36607","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36652","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36575","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36321","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36234","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36117","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36187","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36214","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36126","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2379"},{"reference_url":"https://pidgin.im/news/security/?id=95","reference_id":"","reference_type":"","scores":[],"url":"https://pidgin.im/news/security/?id=95"},{"reference_url":"http://www.securityfocus.com/bid/91335","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91335"},{"reference_url":"http://www.talosintelligence.com/reports/TALOS-2016-0122/","reference_id":"","reference_type":"","scores":[],"url":"http://www.talosintelligence.com/reports/TALOS-2016-0122/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1363715","reference_id":"1363715","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1363715"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:mxit:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:pidgin:mxit:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:mxit:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2379","reference_id":"CVE-2016-2379","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:N/C:P/I:N/A:N"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2379"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2379"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqpn-6ttw-9ffc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57373?format=json","vulnerability_id":"VCID-uf3q-52zp-p3bk","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2377","reference_id":"","reference_type":"","scores":[{"value":"0.03242","scoring_system":"epss","scoring_elements":"0.87257","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03242","scoring_system":"epss","scoring_elements":"0.87249","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.8724","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.8726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87253","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87278","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87299","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87311","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.8733","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87324","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87338","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03306","scoring_system":"epss","scoring_elements":"0.87187","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348852","reference_id":"1348852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348852"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2377"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uf3q-52zp-p3bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57360?format=json","vulnerability_id":"VCID-vczt-sf85-uyfc","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1000030","reference_id":"","reference_type":"","scores":[{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.73033","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72792","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72819","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72795","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72848","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.7289","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72893","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72934","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72944","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72941","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72936","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72962","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72987","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.7295","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72973","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.73025","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1000030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348882","reference_id":"1348882","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348882"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-1000030"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vczt-sf85-uyfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57377?format=json","vulnerability_id":"VCID-vmjg-nj4a-8uby","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4323","reference_id":"","reference_type":"","scores":[{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83581","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.8361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83634","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83642","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83652","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83682","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.8378","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83796","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83683","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83707","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83715","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.8372","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01998","scoring_system":"epss","scoring_elements":"0.83743","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87697","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03481","scoring_system":"epss","scoring_elements":"0.87706","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348857","reference_id":"1348857","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348857"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-4323"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vmjg-nj4a-8uby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57369?format=json","vulnerability_id":"VCID-xgfd-ykfk-33dh","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2373","reference_id":"","reference_type":"","scores":[{"value":"0.01915","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01915","scoring_system":"epss","scoring_elements":"0.83497","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8342","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83482","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83476","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83471","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8351","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83588","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83607","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83623","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83407","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348877","reference_id":"1348877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348877"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2373"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xgfd-ykfk-33dh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57365?format=json","vulnerability_id":"VCID-ym5e-f9a1-ufdz","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2369","reference_id":"","reference_type":"","scores":[{"value":"0.03136","scoring_system":"epss","scoring_elements":"0.87027","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03136","scoring_system":"epss","scoring_elements":"0.87019","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.8708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87119","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87122","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87138","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87143","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87164","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87165","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87185","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87201","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.8722","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87215","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87231","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03252","scoring_system":"epss","scoring_elements":"0.87069","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348869","reference_id":"1348869","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348869"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2369"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ym5e-f9a1-ufdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57362?format=json","vulnerability_id":"VCID-zamj-2ej2-qke5","summary":"Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2366","reference_id":"","reference_type":"","scores":[{"value":"0.01915","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01915","scoring_system":"epss","scoring_elements":"0.83497","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8342","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83482","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83476","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83471","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8351","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.8354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83588","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83607","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83623","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01953","scoring_system":"epss","scoring_elements":"0.83407","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348862","reference_id":"1348862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348862"},{"reference_url":"https://security.gentoo.org/glsa/201701-38","reference_id":"GLSA-201701-38","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-38"},{"reference_url":"https://usn.ubuntu.com/3031-1/","reference_id":"USN-3031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3031-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83401?format=json","purl":"pkg:ebuild/net-im/pidgin@2.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}],"aliases":["CVE-2016-2366"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zamj-2ej2-qke5"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/pidgin@2.11.0"}