Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/935302?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "pidgin", "version": "2.14.14-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87191?format=api", "vulnerability_id": "VCID-13y4-t2b9-pkg9", "summary": "pidgin: SILC remote crash on channel messages", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4603.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4603.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4603", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78575", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78582", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78596", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78621", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78652", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78655", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78653", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.7865", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.7868", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78688", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78705", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78725", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78748", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01165", "scoring_system": "epss", "scoring_elements": "0.78764", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4603" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=766446", "reference_id": "766446", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=766446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1820", "reference_id": "RHSA-2011:1820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1820" }, { "reference_url": "https://usn.ubuntu.com/1500-1/", "reference_id": "USN-1500-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1500-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935323?format=api", "purl": "pkg:deb/debian/pidgin@2.10.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-4603" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13y4-t2b9-pkg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87192?format=api", "vulnerability_id": "VCID-1fmj-vjdg-g3eu", "summary": "pidgin: Multiple NULL pointer deference flaws by processing certain Jingle stanzas in the XMPP protocol plug-in", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4602.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4602.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4602", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81272", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81281", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81303", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81301", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.8133", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81335", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81356", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81341", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81333", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81371", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81374", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81396", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81404", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81408", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81424", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81444", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01535", "scoring_system": "epss", "scoring_elements": "0.81465", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4602" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=761510", "reference_id": "761510", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1820", "reference_id": "RHSA-2011:1820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1821", "reference_id": "RHSA-2011:1821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1821" }, { "reference_url": "https://usn.ubuntu.com/1500-1/", "reference_id": "USN-1500-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1500-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935323?format=api", "purl": "pkg:deb/debian/pidgin@2.10.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-4602" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1fmj-vjdg-g3eu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33761?format=api", "vulnerability_id": "VCID-1p3d-b4v1-6fdg", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6477.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6477.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.76987", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.76992", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77021", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77002", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77045", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77073", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77052", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77047", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77088", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77089", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77082", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77117", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77124", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77138", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77146", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77176", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77197", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056479", "reference_id": "1056479", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056479" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6477" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1p3d-b4v1-6fdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33767?format=api", "vulnerability_id": "VCID-1x1f-8ujk-53fw", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6484.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6484.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71609", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.7164", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.7167", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71652", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71702", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71706", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71711", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71697", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71731", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71765", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057481", "reference_id": "1057481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057481" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6484" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1x1f-8ujk-53fw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87625?format=api", "vulnerability_id": "VCID-25qc-25g9-cbhn", "summary": "(libpurple): Multiple DoS (crash) flaws by processing of unsanitized Base64 decoder values", "references": [ { "reference_url": "http://developer.pidgin.im/viewmtn/revision/info/b01c6a1f7fe4d86b83f5f10917b3cb713989cfcc", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/info/b01c6a1f7fe4d86b83f5f10917b3cb713989cfcc" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050227.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050227.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050695.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050695.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050133.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050133.html" }, { "reference_url": "http://pidgin.im/news/security/?id=48", "reference_id": "", "reference_type": "", "scores": [], "url": "http://pidgin.im/news/security/?id=48" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3711.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3711.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3711", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01058", "scoring_system": "epss", "scoring_elements": "0.77566", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01058", "scoring_system": "epss", "scoring_elements": "0.77596", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01058", "scoring_system": "epss", "scoring_elements": "0.77603", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01058", "scoring_system": "epss", "scoring_elements": "0.7763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01058", "scoring_system": "epss", "scoring_elements": "0.77553", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01058", "scoring_system": "epss", "scoring_elements": "0.77559", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01058", "scoring_system": "epss", "scoring_elements": "0.77585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80382", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80399", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80415", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80437", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80455", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80318", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80312", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80342", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80344", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01385", "scoring_system": "epss", "scoring_elements": "0.80375", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711" }, { "reference_url": "http://secunia.com/advisories/41893", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41893" }, { "reference_url": "http://secunia.com/advisories/41899", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41899" }, { "reference_url": "http://secunia.com/advisories/42075", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42075" }, { "reference_url": "http://secunia.com/advisories/42294", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42294" }, { "reference_url": "http://securitytracker.com/id?1024623", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024623" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62708" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462352", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462352" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18506" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:208", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:208" }, { "reference_url": "http://www.osvdb.org/68773", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/68773" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0788.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0788.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0890.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0890.html" }, { "reference_url": "http://www.securityfocus.com/bid/44283", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44283" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1014-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1014-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2753", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2753" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2754", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2754" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2755", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2755" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2847", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2847" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2851", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2851" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2870", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2870" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=641921", "reference_id": "641921", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641921" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3711", "reference_id": "CVE-2010-3711", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3711" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0788", "reference_id": "RHSA-2010:0788", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0788" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0890", "reference_id": "RHSA-2010:0890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0890" }, { "reference_url": "https://usn.ubuntu.com/1014-1/", "reference_id": "USN-1014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1014-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935318?format=api", "purl": "pkg:deb/debian/pidgin@2.7.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-3711" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-25qc-25g9-cbhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88031?format=api", "vulnerability_id": "VCID-28mm-t6zv-b3fx", "summary": "Pidgin: Invalid pointer dereference (crash) after receiving contacts from SIM IM client", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3615.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3615.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3615", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07985", "scoring_system": "epss", "scoring_elements": "0.9205", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07985", "scoring_system": "epss", "scoring_elements": "0.92056", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07985", "scoring_system": "epss", "scoring_elements": "0.92064", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07985", "scoring_system": "epss", "scoring_elements": "0.92069", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07985", "scoring_system": "epss", "scoring_elements": "0.92081", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07985", "scoring_system": "epss", "scoring_elements": "0.92084", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07985", "scoring_system": "epss", "scoring_elements": "0.92088", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08411", "scoring_system": "epss", "scoring_elements": "0.92331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08411", "scoring_system": "epss", "scoring_elements": "0.92343", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08411", "scoring_system": "epss", "scoring_elements": "0.92342", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08411", "scoring_system": "epss", "scoring_elements": "0.92347", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08411", "scoring_system": "epss", "scoring_elements": "0.92348", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08411", "scoring_system": "epss", "scoring_elements": "0.92341", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08411", "scoring_system": "epss", "scoring_elements": "0.92351", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08411", "scoring_system": "epss", "scoring_elements": "0.92361", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.08411", "scoring_system": "epss", "scoring_elements": "0.92369", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=529357", "reference_id": "529357", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529357" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1535", "reference_id": "RHSA-2009:1535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1536", "reference_id": "RHSA-2009:1536", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1536" }, { "reference_url": "https://usn.ubuntu.com/886-1/", "reference_id": "USN-886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/886-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935313?format=api", "purl": "pkg:deb/debian/pidgin@2.6.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-3615" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28mm-t6zv-b3fx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38810?format=api", "vulnerability_id": "VCID-2v38-xu17-5ycr", "summary": "Multiple vulnerabilities were found in Pidgin, the worst of which\n allowing for the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0013.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0013.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0013", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94012", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94021", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94024", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94032", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94041", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.9404", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94056", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94061", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94062", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94068", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.9408", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.12845", "scoring_system": "epss", "scoring_elements": "0.94091", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=552483", "reference_id": "552483", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552483" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=563206", "reference_id": "563206", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=563206" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/11203.py", "reference_id": "CVE-2010-0013;OSVDB-61420", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/11203.py" }, { "reference_url": "https://security.gentoo.org/glsa/201206-11", "reference_id": "GLSA-201206-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0044", "reference_id": "RHSA-2010:0044", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0044" }, { "reference_url": "https://usn.ubuntu.com/886-1/", "reference_id": "USN-886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/886-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935314?format=api", "purl": "pkg:deb/debian/pidgin@2.6.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-0013" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2v38-xu17-5ycr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38816?format=api", "vulnerability_id": "VCID-3m4a-pw2r-zkfb", "summary": "Multiple vulnerabilities were found in Pidgin, the worst of which\n allowing for the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3594.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3594.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76405", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76409", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76419", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76451", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76465", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76491", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76464", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76505", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76509", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76496", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.7653", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76536", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76549", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76538", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76567", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00959", "scoring_system": "epss", "scoring_elements": "0.76585", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=743481", "reference_id": "743481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=743481" }, { "reference_url": "https://security.gentoo.org/glsa/201206-11", "reference_id": "GLSA-201206-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1371", "reference_id": "RHSA-2011:1371", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1371" }, { "reference_url": "https://usn.ubuntu.com/1273-1/", "reference_id": "USN-1273-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1273-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935323?format=api", "purl": "pkg:deb/debian/pidgin@2.10.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-3594" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3m4a-pw2r-zkfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33769?format=api", "vulnerability_id": "VCID-3zuy-sufn-tfcw", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6487.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6487.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88236", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88244", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88259", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88263", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88283", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88289", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88301", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88293", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88306", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88304", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88303", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88321", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88326", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88329", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88339", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88355", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88367", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057489", "reference_id": "1057489", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057489" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://security.gentoo.org/glsa/201508-02", "reference_id": "GLSA-201508-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201508-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" }, { "reference_url": "https://usn.ubuntu.com/2101-1/", "reference_id": "USN-2101-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2101-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6487" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zuy-sufn-tfcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33765?format=api", "vulnerability_id": "VCID-562h-uev3-nqby", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6482.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6482.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.72956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.72969", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.72989", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.72965", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73002", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73016", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73041", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.7302", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73055", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73065", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73097", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73107", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73105", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73099", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73127", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73148", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056913", "reference_id": "1056913", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056913" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6482" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-562h-uev3-nqby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87884?format=api", "vulnerability_id": "VCID-59qb-mtwz-puda", "summary": "pidgin: Smiley Denial of Service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0423.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0423.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0423", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92488", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92502", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92504", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92516", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92527", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92528", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92538", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92541", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92542", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92543", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.9254", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92549", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.9256", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.9257", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=565792", "reference_id": "565792", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=565792" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0115", "reference_id": "RHSA-2010:0115", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0115" }, { "reference_url": "https://usn.ubuntu.com/902-1/", "reference_id": "USN-902-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/902-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935315?format=api", "purl": "pkg:deb/debian/pidgin@2.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-0423" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-59qb-mtwz-puda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33756?format=api", "vulnerability_id": "VCID-5bxz-xddd-rudq", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6152.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6152.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6152", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78602", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78415", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78452", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78437", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78468", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78493", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78474", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78496", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78495", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78491", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78531", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78547", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78562", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78586", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056473", "reference_id": "1056473", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056473" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-6152" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5bxz-xddd-rudq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33766?format=api", "vulnerability_id": "VCID-5k78-mks2-ckdk", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6483.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6483.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75031", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75063", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7504", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75073", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75085", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75108", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75086", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75075", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75113", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7512", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7511", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75149", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75153", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75157", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75166", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75194", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75218", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056978", "reference_id": "1056978", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056978" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6483" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5k78-mks2-ckdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33759?format=api", "vulnerability_id": "VCID-5ktd-d1vb-xqhb", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "http://hg.pidgin.im/pidgin/main/rev/c31cf8de31cd", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hg.pidgin.im/pidgin/main/rev/c31cf8de31cd" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0273.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0273.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0273", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84222", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84029", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84044", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.8406", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84062", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84085", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84092", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84109", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84103", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.8412", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84122", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84125", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.8415", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84156", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.8416", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.8418", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02107", "scoring_system": "epss", "scoring_elements": "0.84205", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18340" }, { "reference_url": "http://www.pidgin.im/news/security/?id=67", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pidgin.im/news/security/?id=67" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1746-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=910041", "reference_id": "910041", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910041" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0273", "reference_id": "CVE-2013-0273", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0273" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0646", "reference_id": "RHSA-2013:0646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0646" }, { "reference_url": "https://usn.ubuntu.com/1746-1/", "reference_id": "USN-1746-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1746-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935328?format=api", "purl": "pkg:deb/debian/pidgin@2.10.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-0273" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ktd-d1vb-xqhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57769?format=api", "vulnerability_id": "VCID-5us8-sghn-zyf1", "summary": "security update", "references": [ { "reference_url": "http://hg.pidgin.im/pidgin/main/rev/44fd89158777", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hg.pidgin.im/pidgin/main/rev/44fd89158777" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" }, { "reference_url": "http://pidgin.im/news/security/?id=88", "reference_id": "", "reference_type": "", "scores": [], "url": "http://pidgin.im/news/security/?id=88" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3696.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3696.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3696", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84123", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84136", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84154", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84202", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84197", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84193", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84216", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84219", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84244", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84251", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84257", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84276", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84302", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84318", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" }, { "reference_url": "http://secunia.com/advisories/60741", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60741" }, { "reference_url": "http://secunia.com/advisories/61968", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61968" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3055" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2390-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2390-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154910", "reference_id": "1154910", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154910" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3696", "reference_id": "CVE-2014-3696", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3696" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1854", "reference_id": "RHSA-2017:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1854" }, { "reference_url": "https://usn.ubuntu.com/2390-1/", "reference_id": "USN-2390-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2390-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935329?format=api", "purl": "pkg:deb/debian/pidgin@2.10.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3696" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5us8-sghn-zyf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33772?format=api", "vulnerability_id": "VCID-6gvz-3ye8-zyen", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0020.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0020.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.8763", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87632", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87658", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87661", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87676", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87677", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87674", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87691", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87697", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87696", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87711", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87726", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87744", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057502", "reference_id": "1057502", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057502" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-0020" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6gvz-3ye8-zyen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88063?format=api", "vulnerability_id": "VCID-6jkc-nx2t-7fgd", "summary": "Pidgin: NULL pointer dereference by handling IRC topic(s) (DoS)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2703.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2703.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2703", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70565", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70579", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70595", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70573", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70635", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70657", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70643", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70628", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70673", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70682", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70661", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70712", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70721", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70697", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70738", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70774", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2703" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521823", "reference_id": "521823", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1453", "reference_id": "RHSA-2009:1453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1535", "reference_id": "RHSA-2009:1535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1535" }, { "reference_url": "https://usn.ubuntu.com/886-1/", "reference_id": "USN-886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/886-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935310?format=api", "purl": "pkg:deb/debian/pidgin@2.6.2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-2703" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6jkc-nx2t-7fgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57768?format=api", "vulnerability_id": "VCID-6utr-f9hr-wkhd", "summary": "security update", "references": [ { "reference_url": "http://hg.pidgin.im/pidgin/main/rev/6436e14bdb9d", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hg.pidgin.im/pidgin/main/rev/6436e14bdb9d" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" }, { "reference_url": "http://pidgin.im/news/security/?id=87", "reference_id": "", "reference_type": "", "scores": [], "url": "http://pidgin.im/news/security/?id=87" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3695.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3695.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3695", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84123", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84136", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84154", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84202", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84197", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84193", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84216", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84219", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84244", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84251", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84257", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84276", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84302", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02136", "scoring_system": "epss", "scoring_elements": "0.84318", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" }, { "reference_url": "http://secunia.com/advisories/60741", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60741" }, { "reference_url": "http://secunia.com/advisories/61968", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61968" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3055" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2390-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2390-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154909", "reference_id": "1154909", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154909" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3695", "reference_id": "CVE-2014-3695", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1854", "reference_id": "RHSA-2017:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1854" }, { "reference_url": "https://usn.ubuntu.com/2390-1/", "reference_id": "USN-2390-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2390-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935329?format=api", "purl": "pkg:deb/debian/pidgin@2.10.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3695" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6utr-f9hr-wkhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87457?format=api", "vulnerability_id": "VCID-71bq-9kpe-wbc8", "summary": "Pidgin: Multiple NULL pointer dereference flaws in Yahoo protocol plug-in", "references": [ { "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c" }, { "reference_url": "http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1091.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1091.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1091", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81178", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.80984", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.80993", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81016", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81043", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.8105", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81067", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81054", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81047", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81084", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81085", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81082", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81105", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81112", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81121", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81135", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01489", "scoring_system": "epss", "scoring_elements": "0.81156", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1091" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091" }, { "reference_url": "http://secunia.com/advisories/43695", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43695" }, { "reference_url": "http://secunia.com/advisories/43721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43721" }, { "reference_url": "http://secunia.com/advisories/46376", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46376" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66055" }, { "reference_url": "https://hermes.opensuse.org/messages/13195955", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hermes.opensuse.org/messages/13195955" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402" }, { "reference_url": "http://www.pidgin.im/news/security/?id=51", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pidgin.im/news/security/?id=51" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0616.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0616.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-1371.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-1371.html" }, { "reference_url": "http://www.securityfocus.com/bid/46837", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46837" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0643" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0661", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0661" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0669", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0669" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0703" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=683031", "reference_id": "683031", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=683031" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1091", "reference_id": "CVE-2011-1091", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0616", "reference_id": "RHSA-2011:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1371", "reference_id": "RHSA-2011:1371", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1371" }, { "reference_url": "https://usn.ubuntu.com/1273-1/", "reference_id": "USN-1273-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1273-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935320?format=api", "purl": "pkg:deb/debian/pidgin@2.7.11-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.11-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-1091" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-71bq-9kpe-wbc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57364?format=api", "vulnerability_id": "VCID-7fz8-kr7a-xqfb", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90671", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90676", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90686", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90695", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90706", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90712", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90721", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90718", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90737", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90734", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90732", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90745", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90746", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.9074", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90757", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90775", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06022", "scoring_system": "epss", "scoring_elements": "0.90787", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348867", "reference_id": "1348867", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348867" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2368" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fz8-kr7a-xqfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57371?format=api", "vulnerability_id": "VCID-7u2r-rnyz-uyd5", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65152", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65177", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65143", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65193", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65205", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65223", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65211", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65183", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65218", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65225", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65238", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65237", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65217", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65264", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65309", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348880", "reference_id": "1348880", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348880" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2375" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7u2r-rnyz-uyd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57376?format=api", "vulnerability_id": "VCID-83az-td85-sudb", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67335", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67371", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67393", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67372", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67423", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67437", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67459", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67446", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67449", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67461", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67441", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.6747", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67444", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67488", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67527", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348856", "reference_id": "1348856", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348856" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2380" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-83az-td85-sudb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87083?format=api", "vulnerability_id": "VCID-8951-ngtt-pfb5", "summary": "pidgin: Improper validation of incoming plaintext messages in MSN protocol plug-in", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2318.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2318.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2318", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74736", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74766", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.7474", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74788", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.7479", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74781", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74816", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74824", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74815", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74851", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74858", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74862", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74868", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74896", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00845", "scoring_system": "epss", "scoring_elements": "0.74921", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2318" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=819446", "reference_id": "819446", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1102", "reference_id": "RHSA-2012:1102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1102" }, { "reference_url": "https://usn.ubuntu.com/1500-1/", "reference_id": "USN-1500-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1500-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935325?format=api", "purl": "pkg:deb/debian/pidgin@2.10.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-2318" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8951-ngtt-pfb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/145993?format=api", "vulnerability_id": "VCID-8a4f-csqh-53fu", "summary": "gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6486", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79415", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79444", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79431", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79459", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79491", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79474", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79464", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79495", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79492", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79528", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79534", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.7955", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79565", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79587", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01267", "scoring_system": "epss", "scoring_elements": "0.79605", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6486" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935322?format=api", "purl": "pkg:deb/debian/pidgin@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6486" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8a4f-csqh-53fu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57363?format=api", "vulnerability_id": "VCID-9btk-pnjv-1qgb", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83389", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83402", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83416", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.8344", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.8345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83464", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83458", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83454", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83489", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83491", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83493", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83515", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83522", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83524", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83549", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.83571", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01948", "scoring_system": "epss", "scoring_elements": "0.8359", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348865", "reference_id": "1348865", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348865" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2367" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9btk-pnjv-1qgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41429?format=api", "vulnerability_id": "VCID-9hw9-a9yt-p7fv", "summary": "Multiple vulnerabilities have been discovered in Pidgin, allowing for\n remote arbitrary code execution, Denial of Service and service spoofing.", "references": [ { "reference_url": "http://crisp.cs.du.edu/?q=ca2007-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crisp.cs.du.edu/?q=ca2007-1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2957.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2957.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2957", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82463", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.8226", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82273", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82293", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82287", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82314", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82321", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82341", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82335", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82329", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82363", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82364", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82367", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82388", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82399", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82403", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82421", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01709", "scoring_system": "epss", "scoring_elements": "0.82443", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2957" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957" }, { "reference_url": "http://secunia.com/advisories/32859", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32859" }, { "reference_url": "http://secunia.com/advisories/33102", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33102" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17599" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/06/27/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/06/27/3" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html" }, { "reference_url": "http://www.securityfocus.com/bid/29985", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29985" }, { "reference_url": "http://www.ubuntu.com/usn/USN-675-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-675-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=453740", "reference_id": "453740", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453740" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632", "reference_id": "488632", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2957", "reference_id": "CVE-2008-2957", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2957" }, { "reference_url": "https://security.gentoo.org/glsa/200901-13", "reference_id": "GLSA-200901-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200901-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:1023", "reference_id": "RHSA-2008:1023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:1023" }, { "reference_url": "https://usn.ubuntu.com/675-1/", "reference_id": "USN-675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935305?format=api", "purl": "pkg:deb/debian/pidgin@2.4.3-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-2957" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9hw9-a9yt-p7fv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57366?format=api", "vulnerability_id": "VCID-9npz-w7g5-r3b5", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83407", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.8342", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83458", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83468", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83482", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83476", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83471", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83508", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83509", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.8351", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83533", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.8354", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83567", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83588", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83607", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348871", "reference_id": "1348871", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348871" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2370" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9npz-w7g5-r3b5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41428?format=api", "vulnerability_id": "VCID-9sg6-dv5z-sbfq", "summary": "Multiple vulnerabilities have been discovered in Pidgin, allowing for\n remote arbitrary code execution, Denial of Service and service spoofing.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2955.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2955.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2955", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95149", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95072", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95083", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95092", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95096", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95102", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95103", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95106", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95115", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95117", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.9512", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95121", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95122", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.95134", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.17668", "scoring_system": "epss", "scoring_elements": "0.9514", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2955" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955" }, { "reference_url": "http://secunia.com/advisories/30881", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30881" }, { "reference_url": "http://secunia.com/advisories/32859", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32859" }, { "reference_url": "http://secunia.com/advisories/33102", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33102" }, { "reference_url": "http://securityreason.com/securityalert/3966", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/3966" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10131" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18050" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/493682/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/493682/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/29985", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29985" }, { "reference_url": "http://www.ubuntu.com/usn/USN-675-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-675-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/1947", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/1947" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=453736", "reference_id": "453736", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453736" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632", "reference_id": "488632", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2955", "reference_id": "CVE-2008-2955", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2955" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32749.txt", "reference_id": "CVE-2008-2955;OSVDB-46576", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32749.txt" }, { "reference_url": "https://www.securityfocus.com/bid/33414/info", "reference_id": "CVE-2008-2955;OSVDB-46576", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/33414/info" }, { "reference_url": "https://security.gentoo.org/glsa/200901-13", "reference_id": "GLSA-200901-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200901-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:1023", "reference_id": "RHSA-2008:1023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:1023" }, { "reference_url": "https://usn.ubuntu.com/675-1/", "reference_id": "USN-675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/675-1/" }, { "reference_url": "https://usn.ubuntu.com/886-1/", "reference_id": "USN-886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/886-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935304?format=api", "purl": "pkg:deb/debian/pidgin@2.4.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-2955" ], "risk_score": 7.8, "exploitability": "2.0", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9sg6-dv5z-sbfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87193?format=api", "vulnerability_id": "VCID-ach7-fhrx-zqd3", "summary": "(libpurple): Invalid UTF-8 string handling in OSCAR messages", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4601.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88018", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88027", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88048", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88067", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88073", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88083", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88076", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88077", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.8809", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88088", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88087", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88111", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.8811", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88121", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.88137", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0379", "scoring_system": "epss", "scoring_elements": "0.8815", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4601" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=761517", "reference_id": "761517", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1820", "reference_id": "RHSA-2011:1820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1821", "reference_id": "RHSA-2011:1821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1821" }, { "reference_url": "https://usn.ubuntu.com/1500-1/", "reference_id": "USN-1500-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1500-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935323?format=api", "purl": "pkg:deb/debian/pidgin@2.10.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-4601" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ach7-fhrx-zqd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41430?format=api", "vulnerability_id": "VCID-ag3e-ee6x-tbcv", "summary": "Multiple vulnerabilities have been discovered in Pidgin, allowing for\n remote arbitrary code execution, Denial of Service and service spoofing.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434" }, { "reference_url": "http://developer.pidgin.im/attachment/ticket/6500/nss_add_rev.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/attachment/ticket/6500/nss_add_rev.patch" }, { "reference_url": "http://developer.pidgin.im/attachment/ticket/6500/nss-cert-verify.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/attachment/ticket/6500/nss-cert-verify.patch" }, { "reference_url": "http://developer.pidgin.im/ticket/6500", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/ticket/6500" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3532.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3532.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3532", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87577", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87439", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87449", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87484", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.8749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87501", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87497", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87494", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87509", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87511", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87532", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87531", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87544", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03446", "scoring_system": "epss", "scoring_elements": "0.87559", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532" }, { "reference_url": "http://secunia.com/advisories/31390", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31390" }, { "reference_url": "http://secunia.com/advisories/32859", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32859" }, { "reference_url": "http://secunia.com/advisories/33102", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33102" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44220" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10979", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10979" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18327" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html" }, { "reference_url": "http://www.securityfocus.com/bid/30553", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/30553" }, { "reference_url": "http://www.ubuntu.com/usn/USN-675-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-675-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2318", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2318" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=457907", "reference_id": "457907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457907" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434", "reference_id": "492434", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3532", "reference_id": "CVE-2008-3532", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3532" }, { "reference_url": "https://security.gentoo.org/glsa/200901-13", "reference_id": "GLSA-200901-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200901-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:1023", "reference_id": "RHSA-2008:1023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:1023" }, { "reference_url": "https://usn.ubuntu.com/675-1/", "reference_id": "USN-675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935306?format=api", "purl": "pkg:deb/debian/pidgin@2.4.3-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3532" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ag3e-ee6x-tbcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87883?format=api", "vulnerability_id": "VCID-b7pa-sgwm-cbea", "summary": "pidgin: Finch XMPP MUC Crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0420.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0420.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0420", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.8721", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.8722", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87236", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87233", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87252", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.8726", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87266", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87262", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87281", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87276", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87294", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.873", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87303", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.8732", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87333", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03316", "scoring_system": "epss", "scoring_elements": "0.87351", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=565786", "reference_id": "565786", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=565786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0115", "reference_id": "RHSA-2010:0115", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0115" }, { "reference_url": "https://usn.ubuntu.com/902-1/", "reference_id": "USN-902-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/902-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935315?format=api", "purl": "pkg:deb/debian/pidgin@2.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-0420" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b7pa-sgwm-cbea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34329?format=api", "vulnerability_id": "VCID-b8e9-rkt5-cfch", "summary": "Multiple vulnerabilities have been discovered in Pidgin, leading to the\n remote execution of arbitrary code, unauthorized information disclosure, or\n Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3026.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3026.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3026", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.66964", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67001", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67026", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67049", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67081", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67067", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67036", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67069", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67083", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67064", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67085", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67098", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67097", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67107", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00526", "scoring_system": "epss", "scoring_elements": "0.67147", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=519224", "reference_id": "519224", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519224" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542891", "reference_id": "542891", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542891" }, { "reference_url": "https://security.gentoo.org/glsa/200910-02", "reference_id": "GLSA-200910-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200910-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1453", "reference_id": "RHSA-2009:1453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1453" }, { "reference_url": "https://usn.ubuntu.com/886-1/", "reference_id": "USN-886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/886-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935311?format=api", "purl": "pkg:deb/debian/pidgin@2.6.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-3026" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8e9-rkt5-cfch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33764?format=api", "vulnerability_id": "VCID-b8zp-g4xa-t7ad", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6481.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6481.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.76987", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.76992", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77021", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77002", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77045", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77073", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77052", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77047", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77088", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77089", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77082", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77117", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77124", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77138", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77146", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77176", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77197", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056908", "reference_id": "1056908", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056908" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6481" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8zp-g4xa-t7ad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57770?format=api", "vulnerability_id": "VCID-bqxx-44k8-t7fd", "summary": "security update", "references": [ { "reference_url": "http://hg.pidgin.im/pidgin/main/rev/ea46ab68f0dc", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hg.pidgin.im/pidgin/main/rev/ea46ab68f0dc" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" }, { "reference_url": "http://pidgin.im/news/security/?id=90", "reference_id": "", "reference_type": "", "scores": [], "url": "http://pidgin.im/news/security/?id=90" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3698.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3698.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3698", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.7991", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.79916", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.79937", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.79926", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.79955", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.79964", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.79983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.79967", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.79958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.79986", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.79988", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.80017", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.80022", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.80039", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.80051", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.80074", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01332", "scoring_system": "epss", "scoring_elements": "0.80089", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" }, { "reference_url": "http://secunia.com/advisories/60741", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60741" }, { "reference_url": "http://secunia.com/advisories/61968", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61968" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3055" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2390-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2390-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154911", "reference_id": "1154911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154911" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3698", "reference_id": "CVE-2014-3698", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3698" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1854", "reference_id": "RHSA-2017:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1854" }, { "reference_url": "https://usn.ubuntu.com/2390-1/", "reference_id": "USN-2390-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2390-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935329?format=api", "purl": "pkg:deb/debian/pidgin@2.10.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3698" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bqxx-44k8-t7fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57367?format=api", "vulnerability_id": "VCID-ca59-9ma2-nyek", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.8759", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.876", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87616", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87653", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87645", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.8766", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87658", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87675", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87682", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87681", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87696", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87711", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03521", "scoring_system": "epss", "scoring_elements": "0.87729", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348873", "reference_id": "1348873", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348873" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2371" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ca59-9ma2-nyek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57370?format=api", "vulnerability_id": "VCID-cd64-6y6b-rfa3", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86001", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86012", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86029", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86048", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86058", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86072", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.8607", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86082", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86088", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.8608", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.861", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.8611", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86129", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86151", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02781", "scoring_system": "epss", "scoring_elements": "0.86169", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348878", "reference_id": "1348878", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348878" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2374" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cd64-6y6b-rfa3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37785?format=api", "vulnerability_id": "VCID-cmm5-mw5m-bud2", "summary": "A vulnerability in Pidgin might allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2640.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2640.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2640", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72798", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72755", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.7275", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72743", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72773", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72651", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72659", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72701", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72712", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72705", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0073", "scoring_system": "epss", "scoring_elements": "0.72746", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76335", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76331", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1430019", "reference_id": "1430019", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1430019" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859159", "reference_id": "859159", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859159" }, { "reference_url": "https://security.archlinux.org/ASA-201703-18", "reference_id": "ASA-201703-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201703-18" }, { "reference_url": "https://security.archlinux.org/AVG-226", "reference_id": "AVG-226", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-226" }, { "reference_url": "https://security.gentoo.org/glsa/201706-10", "reference_id": "GLSA-201706-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1854", "reference_id": "RHSA-2017:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1854" }, { "reference_url": "https://usn.ubuntu.com/3231-1/", "reference_id": "USN-3231-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3231-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935331?format=api", "purl": "pkg:deb/debian/pidgin@2.12.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2640" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cmm5-mw5m-bud2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87084?format=api", "vulnerability_id": "VCID-cxh3-6xaf-q7fa", "summary": "pidgin: Invalid memory dereference in the XMPP protocol plug-in by processing serie of specially-crafted file transfer requests", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2214.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67633", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67669", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.6769", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.6767", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67722", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67736", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.6776", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67745", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67712", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67747", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67741", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67761", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67772", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67774", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67751", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67793", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67832", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=819449", "reference_id": "819449", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819449" }, { "reference_url": "https://usn.ubuntu.com/1500-1/", "reference_id": "USN-1500-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1500-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935325?format=api", "purl": "pkg:deb/debian/pidgin@2.10.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-2214" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cxh3-6xaf-q7fa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87541?format=api", "vulnerability_id": "VCID-dw47-rgd5-yked", "summary": "Pidgin: MSN DirectConnect DoS (crash) after receiving a short P2P message", "references": [ { "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/e76f4ad4ef2f10588195a0eedc7a08f82062f79c/with/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031/libpurple/protocols/msn/directconn.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/diff/e76f4ad4ef2f10588195a0eedc7a08f82062f79c/with/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031/libpurple/protocols/msn/directconn.c" }, { "reference_url": "http://developer.pidgin.im/viewmtn/revision/info/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/info/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052862.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052862.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052905.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052905.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" }, { "reference_url": "http://pidgin.im/pipermail/support/2010-December/009251.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://pidgin.im/pipermail/support/2010-December/009251.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4528.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4528.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4528", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85969", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85794", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85806", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85824", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85828", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85847", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85857", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85869", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85865", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85888", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.8588", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85901", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.8591", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85911", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85929", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02691", "scoring_system": "epss", "scoring_elements": "0.85951", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4528" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4528", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4528" }, { "reference_url": "http://secunia.com/advisories/42732", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42732" }, { "reference_url": "http://secunia.com/advisories/42824", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42824" }, { "reference_url": "http://secunia.com/advisories/42877", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42877" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18461", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18461" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:259", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:259" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/12/27/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/12/27/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/12/31/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/12/31/5" }, { "reference_url": "http://www.pidgin.im/news/security/?id=49", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pidgin.im/news/security/?id=49" }, { "reference_url": "http://www.securityfocus.com/bid/45581", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45581" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0028" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0054", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0054" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0076", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0076" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608331", "reference_id": "608331", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608331" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=665421", "reference_id": "665421", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665421" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4528", "reference_id": "CVE-2010-4528", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4528" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935319?format=api", "purl": "pkg:deb/debian/pidgin@2.7.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-4528" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dw47-rgd5-yked" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33771?format=api", "vulnerability_id": "VCID-ebg2-bj5n-tycb", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6490.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6490.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97251", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97257", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97258", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97264", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97265", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97269", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.9727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97278", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.9728", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97283", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97286", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.9729", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97295", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97299", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057498", "reference_id": "1057498", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057498" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6490" ], "risk_score": 0.2, "exploitability": "0.5", "weighted_severity": "0.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ebg2-bj5n-tycb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33758?format=api", "vulnerability_id": "VCID-ektc-z3zf-dfep", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0272.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0272.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0272", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83145", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83162", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83175", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83174", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83199", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83205", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83221", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83215", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83211", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83248", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.8325", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83273", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83281", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83289", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83313", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01896", "scoring_system": "epss", "scoring_elements": "0.83334", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474" }, { "reference_url": "http://www.pidgin.im/news/security/?id=66", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pidgin.im/news/security/?id=66" }, { "reference_url": "http://www.securityfocus.com/bid/57951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/57951" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1746-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=910040", "reference_id": "910040", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910040" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0272", "reference_id": "CVE-2013-0272", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0272" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0646", "reference_id": "RHSA-2013:0646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0646" }, { "reference_url": "https://usn.ubuntu.com/1746-1/", "reference_id": "USN-1746-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1746-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935328?format=api", "purl": "pkg:deb/debian/pidgin@2.10.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-0272" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ektc-z3zf-dfep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87290?format=api", "vulnerability_id": "VCID-et2z-svg6-m3ef", "summary": "pidgin: Remote crash in MSN protocol plugin", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3184.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3184.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3184", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85796", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85807", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85825", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.8583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85848", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85858", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85873", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.8587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85866", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85889", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85882", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85903", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85911", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85913", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85931", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.85953", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02692", "scoring_system": "epss", "scoring_elements": "0.8597", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3184" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3184" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=732405", "reference_id": "732405", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=732405" }, { "reference_url": "https://usn.ubuntu.com/1273-1/", "reference_id": "USN-1273-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1273-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935321?format=api", "purl": "pkg:deb/debian/pidgin@2.10.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-3184" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-et2z-svg6-m3ef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87800?format=api", "vulnerability_id": "VCID-ftdp-6cub-sqah", "summary": "Pidgin: MSN SLP emoticon DoS (NULL pointer dereference)", "references": [ { "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/884d44222e8c81ecec51c25e07d005e002a5479b/with/894460d22c434e73d60b71ec031611988e687c8b/libpurple/protocols/msn/slp.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/diff/884d44222e8c81ecec51c25e07d005e002a5479b/with/894460d22c434e73d60b71ec031611988e687c8b/libpurple/protocols/msn/slp.c" }, { "reference_url": "http://developer.pidgin.im/viewmtn/revision/info/894460d22c434e73d60b71ec031611988e687c8b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/info/894460d22c434e73d60b71ec031611988e687c8b" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1624.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86896", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86734", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86744", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86764", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86762", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86781", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.8679", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86803", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.868", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86796", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86811", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86815", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86814", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.8683", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86836", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86859", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03095", "scoring_system": "epss", "scoring_elements": "0.86878", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624" }, { "reference_url": "http://secunia.com/advisories/39801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39801" }, { "reference_url": "http://secunia.com/advisories/41899", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41899" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58559" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18547" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:097", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:097" }, { "reference_url": "http://www.pidgin.im/news/security/index.php?id=46", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pidgin.im/news/security/index.php?id=46" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0788.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0788.html" }, { "reference_url": "http://www.securityfocus.com/bid/40138", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40138" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1014-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1014-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1141" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2755", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=589973", "reference_id": "589973", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=589973" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1624", "reference_id": "CVE-2010-1624", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0788", "reference_id": "RHSA-2010:0788", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0788" }, { "reference_url": "https://usn.ubuntu.com/1014-1/", "reference_id": "USN-1014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1014-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935316?format=api", "purl": "pkg:deb/debian/pidgin@2.7.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-1624" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftdp-6cub-sqah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34327?format=api", "vulnerability_id": "VCID-g8q8-pb2g-qfct", "summary": "Multiple vulnerabilities have been discovered in Pidgin, leading to the\n remote execution of arbitrary code, unauthorized information disclosure, or\n Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1889.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1889.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1889", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87023", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87053", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87046", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87066", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87074", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87087", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87082", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87076", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87092", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87096", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87093", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87112", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87118", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87138", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87154", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87172", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=508738", "reference_id": "508738", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=508738" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535790", "reference_id": "535790", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535790" }, { "reference_url": "https://security.gentoo.org/glsa/200910-02", "reference_id": "GLSA-200910-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200910-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1139", "reference_id": "RHSA-2009:1139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1139" }, { "reference_url": "https://usn.ubuntu.com/796-1/", "reference_id": "USN-796-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/796-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935308?format=api", "purl": "pkg:deb/debian/pidgin@2.5.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1889" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g8q8-pb2g-qfct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87321?format=api", "vulnerability_id": "VCID-gmc8-mf63-x7fs", "summary": "pidgin: Crash in IRC protocol plug-in by listing set of users (/who command) upon session startup", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2943.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2943.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2943", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88302", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.8831", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88325", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.8833", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88355", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88366", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88358", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88373", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.8837", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88387", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88391", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88392", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88403", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88419", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03955", "scoring_system": "epss", "scoring_elements": "0.88432", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2943" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2943", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2943" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638709", "reference_id": "638709", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638709" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=722939", "reference_id": "722939", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722939" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935321?format=api", "purl": "pkg:deb/debian/pidgin@2.10.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-2943" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmc8-mf63-x7fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34328?format=api", "vulnerability_id": "VCID-j7ap-11qk-ufeb", "summary": "Multiple vulnerabilities have been discovered in Pidgin, leading to the\n remote execution of arbitrary code, unauthorized information disclosure, or\n Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2694.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2694.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2694", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.96983", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.96991", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.96995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.96996", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97006", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97007", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.9701", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97011", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97012", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97024", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97028", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97029", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97031", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97033", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97035", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97039", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.34712", "scoring_system": "epss", "scoring_elements": "0.97045", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=514957", "reference_id": "514957", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514957" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542486", "reference_id": "542486", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542486" }, { "reference_url": "https://security.gentoo.org/glsa/200910-02", "reference_id": "GLSA-200910-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200910-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1218", "reference_id": "RHSA-2009:1218", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1218" }, { "reference_url": "https://usn.ubuntu.com/820-1/", "reference_id": "USN-820-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/820-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935309?format=api", "purl": "pkg:deb/debian/pidgin@2.5.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-2694" ], "risk_score": 0.6, "exploitability": "2.0", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7ap-11qk-ufeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33763?format=api", "vulnerability_id": "VCID-jb3a-ydyh-sfft", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6479.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71609", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.7164", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.7167", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71652", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71702", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71706", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71711", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71697", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71731", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71765", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056907", "reference_id": "1056907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056907" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6479" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jb3a-ydyh-sfft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90576?format=api", "vulnerability_id": "VCID-jrfq-eubr-hfa9", "summary": "The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect \"UTF16-LE\" charset name.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3084.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3084.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3084", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80243", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.8025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.8027", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80296", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80315", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.803", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80294", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80324", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80326", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.8033", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80356", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80362", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80379", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80395", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80417", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80436", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935312?format=api", "purl": "pkg:deb/debian/pidgin@2.6.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-3084" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jrfq-eubr-hfa9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51484?format=api", "vulnerability_id": "VCID-ksp5-2txt-vucn", "summary": "Multiple vulnerabilities in Pidgin might allow for the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1375.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1375.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1375", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.89962", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.89964", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.89977", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.89983", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.89998", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.90004", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.90012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.9001", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.90019", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.9002", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.90017", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.90035", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.90034", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.90046", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.90061", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05278", "scoring_system": "epss", "scoring_elements": "0.90073", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=500491", "reference_id": "500491", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500491" }, { "reference_url": "https://security.gentoo.org/glsa/200905-07", "reference_id": "GLSA-200905-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200905-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1060", "reference_id": "RHSA-2009:1060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1060" }, { "reference_url": "https://usn.ubuntu.com/781-1/", "reference_id": "USN-781-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/781-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935307?format=api", "purl": "pkg:deb/debian/pidgin@2.5.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1375" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ksp5-2txt-vucn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57361?format=api", "vulnerability_id": "VCID-kt42-hfwm-7ubh", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87069", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.8708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87098", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87112", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87119", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87132", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87122", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87138", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87143", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87139", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87158", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87164", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87165", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87185", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87201", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.8722", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348858", "reference_id": "1348858", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348858" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2365" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kt42-hfwm-7ubh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87339?format=api", "vulnerability_id": "VCID-mhjx-yrdy-5qf6", "summary": "pidgin: NULL pointer dereference in the XMPP protocol plug-in by renaming user name", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4939.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4939.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4939", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78007", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78014", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78043", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78026", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78057", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78083", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78066", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78062", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78097", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78096", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.7809", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78123", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78129", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78143", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78154", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78181", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78197", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4939" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664028", "reference_id": "664028", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664028" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=803296", "reference_id": "803296", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803296" }, { "reference_url": "https://usn.ubuntu.com/1500-1/", "reference_id": "USN-1500-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1500-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935324?format=api", "purl": "pkg:deb/debian/pidgin@2.10.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-4939" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mhjx-yrdy-5qf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/137516?format=api", "vulnerability_id": "VCID-mjen-7k79-vyd4", "summary": "gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3185", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89769", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89786", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89789", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89807", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89813", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89819", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89818", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.8981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89824", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89833", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89832", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89845", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89861", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05087", "scoring_system": "epss", "scoring_elements": "0.89872", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3185" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935322?format=api", "purl": "pkg:deb/debian/pidgin@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-3185" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mjen-7k79-vyd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57368?format=api", "vulnerability_id": "VCID-myh5-wcpe-zbac", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.78988", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.78994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79021", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79005", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79029", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.7906", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79045", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79035", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79063", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79091", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79097", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79112", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79124", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79145", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01217", "scoring_system": "epss", "scoring_elements": "0.79162", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348876", "reference_id": "1348876", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348876" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2372" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-myh5-wcpe-zbac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57372?format=api", "vulnerability_id": "VCID-nhj7-agfp-rue8", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91312", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91317", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91327", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91334", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91347", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91354", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.9136", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91363", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91388", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91386", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91397", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91395", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91409", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91425", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06853", "scoring_system": "epss", "scoring_elements": "0.91435", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348848", "reference_id": "1348848", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348848" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2376" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nhj7-agfp-rue8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33760?format=api", "vulnerability_id": "VCID-nvtc-a3b6-23bs", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "http://hg.pidgin.im/pidgin/main/rev/ad7e7fb98db3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hg.pidgin.im/pidgin/main/rev/ad7e7fb98db3" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0274.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0274.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0274", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64893", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64675", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64765", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.6478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64786", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64758", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64796", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64807", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64794", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64811", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64824", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64821", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64801", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64849", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0274" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18221", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18221" }, { "reference_url": "http://www.pidgin.im/news/security/?id=68", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pidgin.im/news/security/?id=68" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1746-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=910042", "reference_id": "910042", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910042" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0274", "reference_id": "CVE-2013-0274", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0274" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0646", "reference_id": "RHSA-2013:0646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0646" }, { "reference_url": "https://usn.ubuntu.com/1746-1/", "reference_id": "USN-1746-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1746-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935328?format=api", "purl": "pkg:deb/debian/pidgin@2.10.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-0274" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nvtc-a3b6-23bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57767?format=api", "vulnerability_id": "VCID-nxhy-m3bd-6qab", "summary": "security update", "references": [ { "reference_url": "http://hg.pidgin.im/pidgin/main/rev/2e4475087f04", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hg.pidgin.im/pidgin/main/rev/2e4475087f04" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" }, { "reference_url": "http://pidgin.im/news/security/?id=86", "reference_id": "", "reference_type": "", "scores": [], "url": "http://pidgin.im/news/security/?id=86" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3694.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3694.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3694", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79442", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79472", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79459", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79487", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79517", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.795", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79521", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79518", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79523", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79555", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79561", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79576", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79591", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79613", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0127", "scoring_system": "epss", "scoring_elements": "0.79631", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" }, { "reference_url": "http://secunia.com/advisories/60741", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60741" }, { "reference_url": "http://secunia.com/advisories/61968", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61968" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3055" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2390-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2390-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154908", "reference_id": "1154908", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154908" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3694", "reference_id": "CVE-2014-3694", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1854", "reference_id": "RHSA-2017:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1854" }, { "reference_url": "https://usn.ubuntu.com/2390-1/", "reference_id": "USN-2390-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2390-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935329?format=api", "purl": "pkg:deb/debian/pidgin@2.10.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3694" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nxhy-m3bd-6qab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87721?format=api", "vulnerability_id": "VCID-p1gr-bcnk-pkg7", "summary": "pidgin: ICQ X-Status denial of service (NULL deref)", "references": [ { "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/fcb70f7c12120206d30ad33223ff85be7b226d1c/with/8e8ff246492e45af8f8d0808296d6f2906794dc0/libpurple/protocols/oscar/family_icbm.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/diff/fcb70f7c12120206d30ad33223ff85be7b226d1c/with/8e8ff246492e45af8f8d0808296d6f2906794dc0/libpurple/protocols/oscar/family_icbm.c" }, { "reference_url": "http://developer.pidgin.im/viewmtn/revision/info/8e8ff246492e45af8f8d0808296d6f2906794dc0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/info/8e8ff246492e45af8f8d0808296d6f2906794dc0" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2528.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2528.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2528", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.84112", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.83921", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.83935", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.83951", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.83954", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.83977", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.83984", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.83999", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.83993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.83989", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.84014", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.84015", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.84017", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.84043", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.8405", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.84054", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.84074", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02081", "scoring_system": "epss", "scoring_elements": "0.84097", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2528" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2528", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2528" }, { "reference_url": "http://secunia.com/advisories/40699", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40699" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60566" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462873", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462873" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18359" }, { "reference_url": "http://www.osvdb.org/66506", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/66506" }, { "reference_url": "http://www.pidgin.im/news/security/index.php?id=47", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pidgin.im/news/security/index.php?id=47" }, { "reference_url": "http://www.securityfocus.com/bid/41881", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/41881" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1887", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1887" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2221", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2221" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=617105", "reference_id": "617105", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617105" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2528", "reference_id": "CVE-2010-2528", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2528" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935317?format=api", "purl": "pkg:deb/debian/pidgin@2.7.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-2528" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p1gr-bcnk-pkg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88065?format=api", "vulnerability_id": "VCID-p8dm-3wjm-8bgd", "summary": "Pidgin: NULL pointer dereference by processing a custom smiley (DoS)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3085.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3085.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3085", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76294", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76298", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76307", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.7634", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76354", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.7638", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76358", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76353", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76394", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76385", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76419", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76426", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76439", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76428", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76456", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76476", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3085" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521853", "reference_id": "521853", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521853" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1453", "reference_id": "RHSA-2009:1453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1453" }, { "reference_url": "https://usn.ubuntu.com/886-1/", "reference_id": "USN-886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/886-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935312?format=api", "purl": "pkg:deb/debian/pidgin@2.6.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-3085" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8dm-3wjm-8bgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59146?format=api", "vulnerability_id": "VCID-q5v4-yz4d-yydy", "summary": "A buffer overflow in Pidgin might allow remote attackers to execute\n arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3374.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3374.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3374", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89323", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89328", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.8934", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89342", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89363", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89372", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89381", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.8938", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89377", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89394", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89399", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89401", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.8941", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89429", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04706", "scoring_system": "epss", "scoring_elements": "0.89442", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680661", "reference_id": "680661", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680661" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=837319", "reference_id": "837319", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837319" }, { "reference_url": "https://security.gentoo.org/glsa/201209-17", "reference_id": "GLSA-201209-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1102", "reference_id": "RHSA-2012:1102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1102" }, { "reference_url": "https://usn.ubuntu.com/1500-1/", "reference_id": "USN-1500-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1500-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935326?format=api", "purl": "pkg:deb/debian/pidgin@2.10.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-3374" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5v4-yz4d-yydy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41427?format=api", "vulnerability_id": "VCID-qhab-ydb4-b7gq", "summary": "Multiple vulnerabilities have been discovered in Pidgin, allowing for\n remote arbitrary code execution, Denial of Service and service spoofing.", "references": [ { "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msnp9/slplink.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msnp9/slplink.c" }, { "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msn/slplink.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msn/slplink.c" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2927.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2927.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2927", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.91056", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.90929", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.90934", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.90943", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.90954", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.90965", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.90971", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.9098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.90981", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.91005", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.91003", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.91019", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.91017", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.91013", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.91028", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06329", "scoring_system": "epss", "scoring_elements": "0.91043", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927" }, { "reference_url": "http://secunia.com/advisories/30971", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30971" }, { "reference_url": "http://secunia.com/advisories/31016", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31016" }, { "reference_url": "http://secunia.com/advisories/31105", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31105" }, { "reference_url": "http://secunia.com/advisories/31387", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31387" }, { "reference_url": "http://secunia.com/advisories/31642", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31642" }, { "reference_url": "http://secunia.com/advisories/32859", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32859" }, { "reference_url": "http://secunia.com/advisories/32861", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32861" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44774", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44774" }, { "reference_url": "https://issues.rpath.com/browse/RPL-2647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-2647" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11695" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17972", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17972" }, { "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0246" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1610", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1610" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:143" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:127", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:127" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/07/03/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/07/03/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/07/04/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/07/04/1" }, { "reference_url": "http://www.pidgin.im/news/security/?id=25", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pidgin.im/news/security/?id=25" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0584.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0584.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/493682", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/493682" }, { "reference_url": "http://www.securityfocus.com/archive/1/495165/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/495165/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/495818/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/495818/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/29956", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29956" }, { "reference_url": "http://www.securitytracker.com/id?1020451", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1020451" }, { "reference_url": "http://www.ubuntu.com/usn/USN-675-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-675-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-675-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-675-2" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2032/references", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2032/references" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-08-054", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-054" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=453764", "reference_id": "453764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453764" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:adium:adium:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2927", "reference_id": "CVE-2008-2927", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2927" }, { "reference_url": "https://security.gentoo.org/glsa/200901-13", "reference_id": "GLSA-200901-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200901-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0584", "reference_id": "RHSA-2008:0584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0584" }, { "reference_url": "https://usn.ubuntu.com/675-1/", "reference_id": "USN-675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/675-1/" }, { "reference_url": "https://usn.ubuntu.com/675-2/", "reference_id": "USN-675-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/675-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935304?format=api", "purl": "pkg:deb/debian/pidgin@2.4.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-2927" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qhab-ydb4-b7gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57374?format=api", "vulnerability_id": "VCID-r5z8-wmea-a7by", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87187", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87211", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87238", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87251", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87245", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.8724", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.8726", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87253", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87271", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87278", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87281", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87299", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87311", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.8733", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348854", "reference_id": "1348854", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348854" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2378" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r5z8-wmea-a7by" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88064?format=api", "vulnerability_id": "VCID-rzq7-5psb-dygh", "summary": "Pidgin: NULL pointer dereference by processing incomplete MSN SLP invite (DoS)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3083.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3083.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3083", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79556", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79562", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79572", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.796", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79607", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79628", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79612", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79634", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79668", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79675", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79691", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79707", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79729", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79747", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3083" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521832", "reference_id": "521832", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521832" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1453", "reference_id": "RHSA-2009:1453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1535", "reference_id": "RHSA-2009:1535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1535" }, { "reference_url": "https://usn.ubuntu.com/886-1/", "reference_id": "USN-886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/886-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935312?format=api", "purl": "pkg:deb/debian/pidgin@2.6.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-3083" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rzq7-5psb-dygh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51483?format=api", "vulnerability_id": "VCID-s4gw-ntgc-5bad", "summary": "Multiple vulnerabilities in Pidgin might allow for the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1374.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1374.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1374", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89021", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89029", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89045", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89046", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89064", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89069", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.8908", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89076", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89074", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89088", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89084", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89103", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89109", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89113", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.8912", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89136", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04458", "scoring_system": "epss", "scoring_elements": "0.89147", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=500490", "reference_id": "500490", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500490" }, { "reference_url": "https://security.gentoo.org/glsa/200905-07", "reference_id": "GLSA-200905-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200905-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1060", "reference_id": "RHSA-2009:1060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1060" }, { "reference_url": "https://usn.ubuntu.com/781-1/", "reference_id": "USN-781-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/781-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935307?format=api", "purl": "pkg:deb/debian/pidgin@2.5.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1374" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s4gw-ntgc-5bad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90489?format=api", "vulnerability_id": "VCID-sap1-hcpz-a7dm", "summary": "libpurple in Pidgin 2.1.0 through 2.2.1, when using HTML logging, allows remote attackers to cause a denial of service (NULL dereference and application crash) via a message that contains invalid HTML data, a different vector than CVE-2007-4996.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4999.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4999.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81306", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81335", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81364", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81369", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81391", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81377", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81406", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81407", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81429", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81437", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81441", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81458", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81478", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01541", "scoring_system": "epss", "scoring_elements": "0.81499", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4999" }, { "reference_url": "https://usn.ubuntu.com/548-1/", "reference_id": "USN-548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935303?format=api", "purl": "pkg:deb/debian/pidgin@2.2.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.2.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-4999" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sap1-hcpz-a7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88637?format=api", "vulnerability_id": "VCID-stg3-h3jz-wfa9", "summary": "MSN nudges sent from unknown buddies can cause libpurple to crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4996.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4996.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4996", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81872", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81879", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81898", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81886", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81918", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81919", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81942", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81953", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81958", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81978", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.81998", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0163", "scoring_system": "epss", "scoring_elements": "0.82023", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4996" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4996", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4996" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=314451", "reference_id": "314451", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=314451" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935300?format=api", "purl": "pkg:deb/debian/pidgin@2.2.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.2.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-4996" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-stg3-h3jz-wfa9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33768?format=api", "vulnerability_id": "VCID-stm8-xdkh-7bdf", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6485.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71848", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71857", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71876", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71887", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71898", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71904", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71929", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71934", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71918", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71963", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71968", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71965", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71957", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71992", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.72022", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057484", "reference_id": "1057484", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057484" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6485" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-stm8-xdkh-7bdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33770?format=api", "vulnerability_id": "VCID-tsth-71zg-n3g7", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6489.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6489.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73213", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73223", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73217", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73253", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73267", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73292", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73272", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73265", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73308", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73316", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73343", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73356", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73354", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73349", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73376", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73399", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057490", "reference_id": "1057490", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057490" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6489" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsth-71zg-n3g7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51482?format=api", "vulnerability_id": "VCID-ua4g-zzrd-eyhb", "summary": "Multiple vulnerabilities in Pidgin might allow for the remote execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1373.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1373.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1373", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92264", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92271", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92277", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92279", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92291", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92295", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.923", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92301", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92312", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92311", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92316", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92317", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92323", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92333", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0836", "scoring_system": "epss", "scoring_elements": "0.92341", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=500488", "reference_id": "500488", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500488" }, { "reference_url": "https://security.gentoo.org/glsa/200905-07", "reference_id": "GLSA-200905-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200905-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1059", "reference_id": "RHSA-2009:1059", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1059" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1060", "reference_id": "RHSA-2009:1060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1060" }, { "reference_url": "https://usn.ubuntu.com/781-1/", "reference_id": "USN-781-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/781-1/" }, { "reference_url": "https://usn.ubuntu.com/781-2/", "reference_id": "USN-781-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/781-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935307?format=api", "purl": "pkg:deb/debian/pidgin@2.5.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1373" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ua4g-zzrd-eyhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57373?format=api", "vulnerability_id": "VCID-uf3q-52zp-p3bk", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87187", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87211", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87238", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87251", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87245", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.8724", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.8726", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87253", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87271", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87278", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87281", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87299", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.87311", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03306", "scoring_system": "epss", "scoring_elements": "0.8733", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348852", "reference_id": "1348852", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348852" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2377" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uf3q-52zp-p3bk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87945?format=api", "vulnerability_id": "VCID-vc51-jjp7-v7gb", "summary": "pidgin MSN protocol plugin memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0277.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0277.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0277", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92488", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92502", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92504", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92516", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92527", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92528", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92538", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92541", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92542", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92543", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.9254", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.92549", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.9256", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.08804", "scoring_system": "epss", "scoring_elements": "0.9257", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=554335", "reference_id": "554335", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554335" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566775", "reference_id": "566775", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0115", "reference_id": "RHSA-2010:0115", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0115" }, { "reference_url": "https://usn.ubuntu.com/902-1/", "reference_id": "USN-902-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/902-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935315?format=api", "purl": "pkg:deb/debian/pidgin@2.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-0277" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vc51-jjp7-v7gb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57360?format=api", "vulnerability_id": "VCID-vczt-sf85-uyfc", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000030", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72987", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72792", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72799", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72819", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72795", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72834", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72848", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72855", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.7289", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.729", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72893", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72934", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72944", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72941", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72936", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72962", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348882", "reference_id": "1348882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348882" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-1000030" ], "risk_score": 1.0, "exploitability": "0.5", "weighted_severity": "2.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vczt-sf85-uyfc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57377?format=api", "vulnerability_id": "VCID-vmjg-nj4a-8uby", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83581", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83594", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83608", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.8361", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83634", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83642", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83652", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83682", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83683", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83707", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83715", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.8372", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83743", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.83763", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01998", "scoring_system": "epss", "scoring_elements": "0.8378", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348857", "reference_id": "1348857", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348857" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-4323" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vmjg-nj4a-8uby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/148581?format=api", "vulnerability_id": "VCID-vu3h-hcpa-8ubp", "summary": "Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.", "references": [ { "reference_url": "http://hg.pidgin.im/pidgin/main/rev/68b8eb10977f", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hg.pidgin.im/pidgin/main/rev/68b8eb10977f" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" }, { "reference_url": "http://pidgin.im/news/security/?id=89", "reference_id": "", "reference_type": "", "scores": [], "url": "http://pidgin.im/news/security/?id=89" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3697", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77436", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77233", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.7724", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77268", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.7725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77281", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77289", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77296", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77294", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77334", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77333", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77326", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.7736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77366", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77378", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77387", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01028", "scoring_system": "epss", "scoring_elements": "0.77414", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3697" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3697", "reference_id": "CVE-2014-3697", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3697" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935322?format=api", "purl": "pkg:deb/debian/pidgin@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3697" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vu3h-hcpa-8ubp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87163?format=api", "vulnerability_id": "VCID-whc9-ffhd-j3b6", "summary": "pidgin: Client abort in the MSN protocol plug-in by attempt to display certain, not UTF-8 encoded text", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1178.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1178.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1178", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78319", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78326", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78357", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78339", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78366", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78372", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78398", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.7838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78402", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78401", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78432", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78439", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78455", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78469", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.78493", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01136", "scoring_system": "epss", "scoring_elements": "0.7851", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1178" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664030", "reference_id": "664030", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664030" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=803298", "reference_id": "803298", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803298" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1102", "reference_id": "RHSA-2012:1102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1102" }, { "reference_url": "https://usn.ubuntu.com/1500-1/", "reference_id": "USN-1500-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1500-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935324?format=api", "purl": "pkg:deb/debian/pidgin@2.10.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1178" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whc9-ffhd-j3b6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33762?format=api", "vulnerability_id": "VCID-wprn-gtbj-ukgf", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6478.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6478.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86751", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86762", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86781", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86778", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86798", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86807", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.8682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86816", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86812", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86828", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86832", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86831", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86848", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86854", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86855", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86878", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86897", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86914", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056904", "reference_id": "1056904", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056904" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api", "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6478" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wprn-gtbj-ukgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90574?format=api", "vulnerability_id": "VCID-x5c5-b5s8-bbe1", "summary": "Unspecified vulnerability in Pidgin 2.6.0 allows remote attackers to cause a denial of service (crash) via a link in a Yahoo IM.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3025.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3025.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3025", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71683", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71656", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71696", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71707", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.7173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71714", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.7174", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71746", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71728", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71777", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71782", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71788", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71773", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71806", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71839", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3025" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935311?format=api", "purl": "pkg:deb/debian/pidgin@2.6.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-3025" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x5c5-b5s8-bbe1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87509?format=api", "vulnerability_id": "VCID-xekx-jf8h-93hy", "summary": "Cipher API information disclosure in pidgin", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4922.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4922.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4922", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29153", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29224", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29276", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29154", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29196", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29202", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29156", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29103", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29129", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29106", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28939", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28827", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28755", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28605", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28665", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28685", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4922" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=684685", "reference_id": "684685", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=684685" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0616", "reference_id": "RHSA-2011:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0616" }, { "reference_url": "https://usn.ubuntu.com/1500-1/", "reference_id": "USN-1500-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1500-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935320?format=api", "purl": "pkg:deb/debian/pidgin@2.7.11-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.11-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-4922" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xekx-jf8h-93hy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57369?format=api", "vulnerability_id": "VCID-xgfd-ykfk-33dh", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83407", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.8342", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83458", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83468", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83482", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83476", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83471", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83508", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83509", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.8351", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83533", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.8354", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83567", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83588", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83607", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348877", "reference_id": "1348877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348877" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2373" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xgfd-ykfk-33dh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33757?format=api", "vulnerability_id": "VCID-y3ke-yqy2-bbey", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "http://hg.pidgin.im/pidgin/main/rev/a8aef1d340f2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hg.pidgin.im/pidgin/main/rev/a8aef1d340f2" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0271.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0271.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0271", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68293", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68107", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68102", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68154", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68169", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68194", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.6818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68185", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68197", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68179", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68222", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68231", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68236", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68211", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68256", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18386" }, { "reference_url": "http://www.pidgin.im/news/security/?id=65", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pidgin.im/news/security/?id=65" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1746-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=910039", "reference_id": "910039", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910039" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0271", "reference_id": "CVE-2013-0271", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0271" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://usn.ubuntu.com/1746-1/", "reference_id": "USN-1746-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1746-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935328?format=api", "purl": "pkg:deb/debian/pidgin@2.10.6-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-0271" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y3ke-yqy2-bbey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57365?format=api", "vulnerability_id": "VCID-ym5e-f9a1-ufdz", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87069", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.8708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87098", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87112", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87119", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87132", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87122", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87138", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87143", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87139", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87158", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87164", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87165", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87185", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.87201", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03252", "scoring_system": "epss", "scoring_elements": "0.8722", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348869", "reference_id": "1348869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348869" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2369" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ym5e-f9a1-ufdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34326?format=api", "vulnerability_id": "VCID-ypkz-jxvb-9fgd", "summary": "Multiple vulnerabilities have been discovered in Pidgin, leading to the\n remote execution of arbitrary code, unauthorized information disclosure, or\n Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1376.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1376.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1376", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96229", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96237", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96248", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96257", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.9626", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96264", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96267", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96276", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96281", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96283", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96284", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96285", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96287", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96295", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96301", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.25885", "scoring_system": "epss", "scoring_elements": "0.96307", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=500493", "reference_id": "500493", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500493" }, { "reference_url": "https://security.gentoo.org/glsa/200905-07", "reference_id": "GLSA-200905-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200905-07" }, { "reference_url": "https://security.gentoo.org/glsa/200910-02", "reference_id": "GLSA-200910-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200910-02" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/9615.jar", "reference_id": "OSVDB-54647;CVE-2009-2694;CVE-2009-1376", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/9615.jar" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1059", "reference_id": "RHSA-2009:1059", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1059" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1060", "reference_id": "RHSA-2009:1060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1060" }, { "reference_url": "https://usn.ubuntu.com/781-1/", "reference_id": "USN-781-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/781-1/" }, { "reference_url": "https://usn.ubuntu.com/781-2/", "reference_id": "USN-781-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/781-2/" }, { "reference_url": "https://usn.ubuntu.com/886-1/", "reference_id": "USN-886-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/886-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935307?format=api", "purl": "pkg:deb/debian/pidgin@2.5.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1376" ], "risk_score": 0.4, "exploitability": "2.0", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ypkz-jxvb-9fgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57362?format=api", "vulnerability_id": "VCID-zamj-2ej2-qke5", "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83407", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.8342", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83458", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83468", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83482", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83476", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83471", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83508", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83509", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.8351", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83533", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.8354", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83567", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83588", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01953", "scoring_system": "epss", "scoring_elements": "0.83607", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348862", "reference_id": "1348862", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348862" }, { "reference_url": "https://security.gentoo.org/glsa/201701-38", "reference_id": "GLSA-201701-38", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-38" }, { "reference_url": "https://usn.ubuntu.com/3031-1/", "reference_id": "USN-3031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3031-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api", "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api", "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zhu6-8jrm-73bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2366" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zamj-2ej2-qke5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79463?format=api", "vulnerability_id": "VCID-zhu6-8jrm-73bc", "summary": "pidgin: MITM attack possible on non-DNSSEC XMPP connections", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26491.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26491.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26491", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78925", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78908", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78932", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78938", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78962", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78947", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78937", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78966", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78993", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.78999", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.79015", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.79031", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.79052", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01204", "scoring_system": "epss", "scoring_elements": "0.79065", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26491" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081227", "reference_id": "2081227", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081227" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935332?format=api", "purl": "pkg:deb/debian/pidgin@2.14.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api", "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api", "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-26491" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu6-8jrm-73bc" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie" }